Evidence Suggests DigiNotar, Who Issued Fraudulent Google Certificate, Was Hacked Years Ago

from the diginot dept

The big news in the security world, obviously, is the fact that a fraudulent Google certificate made its way out into the wild, apparently targeting internet users in Iran. The Dutch company DigiNotar has put out a statement saying that it discovered a breach back on July 19th during a security audit, and that fraudulent certificates were generated for “several dozen” websites. The only one known to have gotten out into the wild is the Google one. Either way, as everyone scrambles to clean this up, you should remove DigiNotar from your browser trust root (usually under “advanced” or somewhere in the options). Whether or not you do this, DigiNotar is probably effectively dead as an ongoing issuer of security certificates. No one will trust them again.

So how was this done? The folks at F-Secure have found some evidence suggesting the company was hacked by Iranian hackers (probably working for the government). But what’s really scary, is that the evidence F-Secure found suggests that DigiNotar was hacked at least two years ago. F-Secure also takes issue with DigiNotar’s explanation concerning how this one fraudulent Google certificate got out:

While Diginotar revoked the other rogue certificates, they missed the one issued to Google. Didn’t Diginotar think it’s a tad weird that Google would suddenly renew their SSL certificate, and decide to do it with a mid-sized Dutch CA, of all places? And when Diginotar was auditing their systems after the breach, how on earth did they miss the Iranian defacement discussed above?

Realistically, this raises a much larger issue about our reliance on these Certificate Authorities, and what happens when their security is weak, as appears to be the case with DigiNotar. As the EFF notes, it’s time to move beyond this method of security:

As the problems with the certificate authority system become clear, lots of people are working on ways to detect and mitigate these attacks. Chrome’s pinning feature is available not only to Google web sites but to any webmaster; if you run an HTTPS site, you can contact the Chrome developers and get your site’s keys hard-coded. Other browser vendors may implement a similar feature soon. The same result could also be achieved by giving web sites themselves a way to tell browsers what certificates to anticipate?and efforts to do this are now underway, building on top of DNSSEC or HSTS. Then browsers could simply not believe conflicting information, or at least provide a meaningful way to report it or warn the user about the situation.

Of course, there will be no DNSSEC if PROTECT IP passes… Another reason to worry about that law, as it closes off one path to protect against these kinds of attacks.

Filed Under: , , , ,
Companies: diginotar, google

Rate this comment as insightful
Rate this comment as funny
You have rated this comment as insightful
You have rated this comment as funny
Flag this comment as abusive/trolling/spam
You have flagged this comment
The first word has already been claimed
The last word has already been claimed
Insightful Lightbulb icon Funny Laughing icon Abusive/trolling/spam Flag icon Insightful badge Lightbulb icon Funny badge Laughing icon Comments icon

Comments on “Evidence Suggests DigiNotar, Who Issued Fraudulent Google Certificate, Was Hacked Years Ago”

Subscribe: RSS Leave a comment
13 Comments
SD says:

Seems like most of these problems involve one trusted root changing to another completely different one in the spoofed cert. Browsers should easily be able to throw up a red flag if the old CA doesn’t match the new one. A user might click through it, but a graphical web of trust model should be implemented too. If a user in Iran is shown on a world map that the change is concentrated in Iran they would know some funny business is going on.

Anonymous Coward says:

Tough problem to solve

“if you run an HTTPS site, you can contact the Chrome developers and get your site’s keys hard-coded.”

a) I don’t think this could scale very far (a couple dozen are supported so far).
b) google in essence becomes the cert authority – who’s to prevent them from getting false info.
c) These are hard-coded into the binary. If google wants to revoke a trusted cert, they have to wait for users to update chrome.

Tackling this issue is a valuable endeavor, and I’d love to see other ideas. Its not a simple problem.

SD says:

Re: Tough problem to solve

Except Google isn’t offering to hard-code site certificates at all.

They are offering to hard-code the new “HTTP Strict Transport Security” setting, which solves a different problem. HSTS just forces a browser to load a site via HTTPS all the time rather than HTTP. It doesn’t need to be hard-coded. A site owner can set up a HSTS response header on their site themselves, and upon every subsequent reload of their site it will never attempt an unencrypted connection until the header expires. Most likely Google will end up only hard-coding a list of payment processors and banking institutions or remove hard-coding completely.

eric says:

I don’t consider myself an expert, but I have looked into their service for the Dutch organisation I work for and thought it was a big step forward in getting communication between companies digital. No longer paper and stamps, but fast and trusted emails. That “trusted” part was the most important. Diginotar is a TTP (TRUSTED third party, oops) and the safety aspect is considered crucial by our lawyers. A small experiment with the service will now be a little bit further in the future I guess. Also shows that my line of business (post and archives) has changed from putting date stamps with red ink on paper to reading Iranian dissident blogs. Any suggestions about which websites/blogs it is smart to follow if you have my job (in Holland I follow “Breed”)?

Add Your Comment

Your email address will not be published. Required fields are marked *

Have a Techdirt Account? Sign in now. Want one? Register here

Comment Options:

Make this the or (get credits or sign in to see balance) what's this?

What's this?

Techdirt community members with Techdirt Credits can spotlight a comment as either the "First Word" or "Last Word" on a particular comment thread. Credits can be purchased at the Techdirt Insider Shop »

Follow Techdirt

Techdirt Daily Newsletter

Ctrl-Alt-Speech

A weekly news podcast from
Mike Masnick & Ben Whitelaw

Subscribe now to Ctrl-Alt-Speech »
Techdirt Deals
Techdirt Insider Discord
The latest chatter on the Techdirt Insider Discord channel...
Loading...