Jeremy Rowley resigns from DigiCert due to mass-revocation incident
DigiCert identified a bug allowing certificate issuance without an underscore prefix, affecting 83,267 certificates. They plan revocation within 24 hours, but critical sector customers may face reissuance challenges.
Read original articleDigiCert is currently addressing a potential issue related to its DNS-based validation method for certificate issuance. A recent code review revealed that a bug in the system could allow certificates to be issued without the required underscore prefix in the CNAME resource record. This issue was identified during an investigation prompted by a certificate problem report. DigiCert supports various DNS verification methods, and the bug was found specifically in the implementation of one method where the underscore prefix was not being appended correctly. Although the issue was inadvertently resolved during a user-experience enhancement project, DigiCert is still gathering information on the impacted certificates. They have identified approximately 83,267 certificates affecting 6,807 subscribers and are preparing to initiate revocation within a 24-hour timeframe. However, some customers, particularly those in critical sectors, may face challenges in reissuing certificates without service interruptions. DigiCert is committed to adhering to the CA/Browser Forum Baseline Requirements and is actively engaging with stakeholders to address the situation.
- DigiCert discovered a bug allowing certificate issuance without an underscore prefix in CNAME records.
- Approximately 83,267 certificates affecting 6,807 subscribers are identified for potential revocation.
- The issue was initially prompted by a certificate problem report and confirmed during a code review.
- DigiCert is committed to compliance with CA/Browser Forum Baseline Requirements.
- Some customers in critical sectors may struggle with timely certificate reissuance.
Related
Entrust certificates will not be trusted in Chrome 127+
The Chrome Root Program Policy is updating trust for Entrust CAs due to compliance issues. Entrust must show improvement to maintain trust. Chrome will oversee changes to safeguard users and the web.
Telekom Security: Revocation delay for TLS certificates
Telekom Security experienced a delay in revoking TLS certificates, affecting 336 certificates due to basicConstraints not marked as critical. Efforts were made to prompt customers for replacement within 5 days. Lessons included the need for customer sensitization and faster certificate replacement procedures. Automation via protocols like ACME was considered for future processes. Stakeholders questioned the delay, but Telekom Security defended its decision based on low security risk and impact on critical infrastructures. The incident underscored challenges faced by CAs in ensuring timely revocation and the importance of continuous improvement for industry standards and trust.
Deutsche Telekom issued invalid certificates, hasn't revoked them since 6 months
Telekom Security faced delays in revoking TLS certificates, impacting critical infrastructures. Efforts were made to replace 336 certificates within 5 days, highlighting the need for faster procedures and customer sensitization. Mozilla raised concerns about the response, emphasizing the importance of compliance with industry standards.
DigiCert Revocation Incident (CNAME Domain Validation)
DigiCert reported a certificate revocation incident affecting 0.4% of domain validations due to improper Domain Control Verification. Customers must replace affected certificates promptly and follow reissue procedures.
Health industry company sues to prevent certificate revocation
Alegeus Technologies has sued DigiCert to prevent the revocation of security certificates due to a flaw in validation. A Temporary Restraining Order has been granted, complicating compliance and raising security concerns.
Also, as noted in the comments, it sets a bad precedent for people coming forward reporting issues.
“When DigiCert has another incident (and while I have tremendous faith in Tim, it will happen), I would rather that they have Jeremy Rowley with his wisdom and scar tissue around to guide their response and subsequent improvement.”
This could happen to anyone, but imagine being the developer or development team that made this mistake.
Really does sound like he personally dropped the ball in the handling of the report. It would be interesting to hear the story from the researcher who will undoubtably have been frustrated beyond reason that they kept acting like there was no issue despite the repeated persistent attempts at getting them to take it serious.
Unless it's malice, or the fault truly is entirely on that person, what good would resigning do?
Rowley admitted he fucked up, badly, he admitted on several layers what must be changed. How he must change. How the org must change. How the way things are presently is not good enough. Made an extremely deep dive into what happened.
And now he's leaving??? Someone who royalty messes up, would not want to mess up on the same issue twice. So all that experience is now worthless and doesn't benefit Digicert in the slightest.
This seems crazy to me. In what world does suing your business partner make more sense than clicking some buttons in a UI or running some shell commands to renew your cert?
One could even get fancy and use verifiable randomness for everything in the protocol that is supposed to be random.
And then one could refactor some other code with much less worry about messing up.
This might also reduce the blast radius from a bug in some other component. If the magic random string generator can be coerced into returning ‘www’, then a separate check would prevent this from compromising everything.
(I work in a different industry, and in my industry there is plenty of complex, evolving code, that needs to do the right thing. The more competent players have separate verification code as a double-check.)
How can it make economic sense to initiate a lawsuit rather than just get new certificates?
It's a rare incident where a C-level executive actually takes accountability for their fuck up. Shit rolls down hill. He is very likely to end up taking the helm at another place or startup on his own. He is the exact opposite of the CrowdStrike CEO (George Kurtz) that caused an absolute shitstorm compared to DigiCert incident.
Interesting. What is the value of a microservice that generates random numbers over just using a language's SecureRandom equivalent?
This is what real accountability looks like, and doing so not only preserves the reputation and trustworthiness of his employer, but demonstrates that he is a valuable contributor and trustworthy individual. He will land on his feet as a result.
Resigning is what you do when you are clearly not fit for your post. Jeremy has demonstrated that he is anything but unfit. People that can see where things went wrong, who can communicate such, can come up with changes to fix those issues, and can implement them are exactly what is needed at such a high level of management. Most people would bury the story or claim ignorance, but Jeremy doesn't hide anything and takes full responsibility.
I wish Jeremy could have stayed and used this honesty and insight to make the necessary changes. Firing a C-level executive when things go wrong doesn't fix anything any more than finding a low level engineer to blame and fire. Experienced people learn lessons by making mistakes. It sucks that it happens, but unexpected circumstances can't be foreseen. Hindsight is 20/20. Now that they know, they know to look out for it and to change the system to prevent it next time.
Perhaps he did overlook it. Perhaps he didn't respond when he should have. It's easy to get complacent. This is a wake up call. I have no doubt that he would be much more attentive and responsive as a result of this, and as such, be exactly what's needed for his post.
Mistakes don't call for sacrifices; they call for systematic changes to prevent making the same mistakes again.
Thank you Jeremy for being as forthcoming as you have been. I only wish more C-level execs would do the same. I hope you find a good place to land where you can take this experience and do an even better job. And I hope that whoever replaces you can bring the same rigor and professionalism that your brought.
Related
Entrust certificates will not be trusted in Chrome 127+
The Chrome Root Program Policy is updating trust for Entrust CAs due to compliance issues. Entrust must show improvement to maintain trust. Chrome will oversee changes to safeguard users and the web.
Telekom Security: Revocation delay for TLS certificates
Telekom Security experienced a delay in revoking TLS certificates, affecting 336 certificates due to basicConstraints not marked as critical. Efforts were made to prompt customers for replacement within 5 days. Lessons included the need for customer sensitization and faster certificate replacement procedures. Automation via protocols like ACME was considered for future processes. Stakeholders questioned the delay, but Telekom Security defended its decision based on low security risk and impact on critical infrastructures. The incident underscored challenges faced by CAs in ensuring timely revocation and the importance of continuous improvement for industry standards and trust.
Deutsche Telekom issued invalid certificates, hasn't revoked them since 6 months
Telekom Security faced delays in revoking TLS certificates, impacting critical infrastructures. Efforts were made to replace 336 certificates within 5 days, highlighting the need for faster procedures and customer sensitization. Mozilla raised concerns about the response, emphasizing the importance of compliance with industry standards.
DigiCert Revocation Incident (CNAME Domain Validation)
DigiCert reported a certificate revocation incident affecting 0.4% of domain validations due to improper Domain Control Verification. Customers must replace affected certificates promptly and follow reissue procedures.
Health industry company sues to prevent certificate revocation
Alegeus Technologies has sued DigiCert to prevent the revocation of security certificates due to a flaw in validation. A Temporary Restraining Order has been granted, complicating compliance and raising security concerns.