26 March, 2018

23,000 Users Have SSL Certificates Revoked In An Altercation Between Trustico And DigiCert.

Written by Aleksandar


How the Story Developed


On the second of February, Trustico asked DigiCert to revoke all 50,000 certificates that were managed by them. This was due to DigiCert buying out Symantec’s certificate business. Symantec had been at the centre of many stories regarding the compromise of their certificates.

Trustico is a certificate reseller, and as such, dropped DigiCert and shacked up with Comodo. In the meantime, DigiCert denies the request to revoke the certificates. DigiCert stated that industry guidelines were not clear on whether a certificate reseller has that sort of power.

DigiCert said they would only revoke the certificates if there was evidence of a security breach. At which point, DigiCert claims that Trustico sent an email containing 23,000 private keys of customer issued certificates.

CA industry rules state that compromised certificates must be revoked within 24 hours after a security incident. It was at this point that DigiCert started the process of revoking the 23,000 compromised certificates.


How And Why Did Trustico Have 23,000 Private Keys?


It is thought that Trustico was automating the process for the Certificate Signing Request, or CSR. They were generating the SSL certificates but also keeping a copy of the private key.

The CA is not supposed to have any knowledge of the private key. Having access to the private key is like having the key to the kingdom, as such, it should only be known by the owner.


DigiCert Notifies Mozilla


DigiCert has now notified the likes of Mozilla, developer of popular web browser Firefox, that 23,000 keys have been compromised.

DigiCert will publicly release the private keys later to make sure that browsers can mark them as untrusted.

Why did Trustico want to revoke the certificates in the first place?


Symantec’s SSL-issuance business was bought out by DigiCert. By that point, Symantec had made a bad name for themselves in the certificate business. Symantec was the centre of many different security incidents. Last year it got to the point where Google announced it would start distrusting any Symantec issued certificate, compromised or not.

These 50,000 initial certificates bought for resale by Trustico were on the old Symantec infrastructure, and as such, Trustico felt it was a good idea to revoke said certificates.

Little did anyone know, that Trustico were playing fast and loose with security practices just as much as Symantec were.


The Current State of the Situation


On the 2nd of March, Trustico’s system to get replaced revoked certificates failed. This leaves 23,000 users and companies with websites and apps that will now encounter HTTPS security errors.

It would be surprising if anyone were to trust Trustico going forward. The ineptitude on their part has lead to the disruption of tens of thousands of websites. On top of that, Trustico also automatically stores your private keys, meaning the security of your website is not truly safe.

Note: never disclosed its private keys to anyone to keep the security intact.

15 minutes ago

What Is Zero Trust And Why Is It An Effective Cyber Security Model

26 March, 2018

Thousands of teenagers across the UK will have school lessons in mindfulness in an experiment designed to see if it can protect against mental illness.

Written by Aleksandar

15 minutes ago

What Is Zero Trust And Why Is It An Effective Cyber Security Model

26 March, 2018

Thousands of teenagers across the UK will have school lessons in mindfulness in an experiment designed to see if it can protect against mental illness.

Written by Aleksandar

Devil twin is like a mirror copy of the original WiFi

freeVPN is trusted by more than 5 million users because we are different. Checkout some of the features which set us apart from other VPN providers out there.

Learn More