Mozilla Requests CA Audits

September 8, 2011

The security breach at the Dutch Certificate Authority [CA] DigiNotar continues to have follow-on effects.  The ThreatPost blog, from the security firm Kaspersky Labs, reports that the Mozilla organization, builder of the Firefox browser, has requested all the CAs providing root certificates recognized by Firefox to complete an immediate review of their security regimes.

Mozilla officials have notified all of the CAs involved in the organization’s trusted root program for Firefox that they need to perform the audits and other required actions within the next eight days and send the results to Mozilla.

A copy of the message to CAs was posted on the group mozilla.dev.security.policy.  The note requests a number of specific actions, including:

  • Audit of CA systems for intrusion or compromise
  • Confirmation that multiple-factor authentication is required to issue certificates
  • Confirmation that provisions are in place to flag certificate requests for high-profile domains (such as Google)
  • Implementation of controls to check that certificates are only issued for authorized domains (in line with the draft Internet standard RFC 5280, “Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile”)

Mozilla has requested these actions apply not only to the root CAs, but also to any other second-tier entities to which certificate authority has been delegated.

Mozilla, along with Google and Microsoft, released updated versions of its browser software to “blacklist” DigiNotar certificates in response to the security breach there.   If nothing else, this was certainly a colossal nuisance for the browser vendors, one they would prefer not to experience regularly.  These short-notice updates are inconvenient and potentially confusing to end users, too.

Now, Mozilla officials are hoping to head off another such incident before it occurs by requiring all of the CAs trusted by Firefox to inspect their own systems and ensure that they have the proper security controls in place to help prevent a similar compromise.

In theory, the CAs are supposed to take reasonable steps to verify the identity and authority of those who request the issuance of server certificates.  A concern has always been that the CAs may have an economic incentive to be less than totally diligent about this vetting process; after all, they get paid for issuing certificates, not for rejecting certificate requests.

It seems to me that the major browser vendors have at least some leverage over the CAs.  If no one’s browser trusts certificates from the Nocturnal Aviation CA, they are not likely to be attractive to potential customers.  I hope that other browser vendors will make a similar effort.


Microsoft Patch Tuesday Preview, September 2011

September 8, 2011

In line with its usual schedule, Microsoft today released its Security Bulletin Advanced Notification for September, previewing the security bulletins and associated patches that it plans to release next Tuesday, September 13.  This month, Microsoft intends to release five bulletins, all with a severity rating of Important.  Two of the bulletins are for Windows itself,although one appears to affect only server versions; all supported versions of Windows are affected.  The remaining three bulletins are for Microsoft Office (including Office for Mac), and for associated server software, such as SharePoint server, Forms server, and Groove server.

Microsoft’s announcement says that one of the Windows patches will definitely require a system restart; the others may require a restart, depending on your system’s configuration.

As always, this information is subject to change between now and the actual release of the bulletins next Tuesday.  I will post a note here once the actual updates are available.


%d bloggers like this: