After digital certificate hack, Mozilla seeks reassurances
- 09 September, 2011 05:32
Following the high-profile hack of DigiNotar, the makers of the Firefox browser are asking issuers of digital certificates to take a hard look at their internal security and to report back in a week.
In emails sent out to digital certificate authorities Thursday, Mozilla Certificate Authority (CA) Certificates Module owner Kathleen Wilson asked CAs such as Symantec and Go Daddy to audit their systems for any possible compromise, confirm that nobody can issue a digital certificate without two-factor authentication, and shore up practices with any third parties that might be able to issue digital certificates using the CA's root key.
Mozilla is giving CAs until Sept. 16 to respond to the email, but the browser maker is not saying what will happen if any of its 54 CAs ignore the request.
Mozilla is also telling the CAs to put "automatic blocks in place for high-profile domain names (including those targeted in the DigiNotar and Comodo attacks this year)," Wilson wrote in the email, which was posted to a Mozilla security discussion forum Thursday morning, Pacific time. "Please further confirm your process for manually verifying such requests, when blocked," she wrote.
By asking for a manual verification, Mozilla is trying to make it harder for anyone to issue a digital certificate for Google.com or Facebook.com, two domains that were targeted in the DigiNotar hack. Whoever pulled off that attack helped someone execute a massive man-in-the-middle attack that may have compromised security for as many as 300,000 Iranian Internet users.
Companies such as DigiNotar issue digital certificates that tell browsers and other Internet programs that the servers that they are dealing with are legitimate -- the real Google.com website, and not some phishing site, for example. If hackers can steal digital certificates and somehow also mess with their victim's network to redirect to fake sites, the attackers can create virtually undetectable phishing attacks.
In the case of the DigiNotar hack, security experts believe that this technique was used to break into Gmail accounts.
This week, the hacker who earlier in the year broke into Comodo, another CA, took credit for the DigiNotar hack and said he'd compromised four other CAs, including GlobalSign. GlobalSign immediately stopped issuing digital certificates and began a security audit.
"Anytime we see a security issue like this that might effect [sic] multiple CAs, you can expect to see us communicating actively and quickly," a Mozilla spokeswoman said Thursday via instant message.
Although the Comodo and DigiNotar hacks have shone light on the CA industry and its security practices, it is still too easy to obtain a digital certificate without any human checking to see if it is a legitimate request, said Comodo CEO Melih Abdulhayoglu in an interview Wednesday. Comodo has revamped its security processes since the March attack, but many other certificate authorities still have work to do, he said. "There are hundreds of Certification Authorities out there with the ability to issue certificates to literally anyone. How are they being protected?"
The industry is unprepared for attacks such as the Comodo and DigiNotar incidents, he added. "You've seen it twice in six months. The industry is not ready. The way the industry operates leaves itself vulnerable."
DigiNotar, which took more than a month to notify Mozilla of this latest hack, has had its root certificate removed from Mozilla's list of trusted CAs. Comodo, however, is still listed.