Skip to main content
banner image
venafi logo

Google, Apple, GoDaddy Mis-issue Over 1 Million Faulty Certificates

Google, Apple, GoDaddy Mis-issue Over 1 Million Faulty Certificates

63-bit certificate snafu
March 12, 2019 | Scott Carter

The trust you place in your Certificate Authorities (CAs) can change in a heartbeat. Even the largest and most trusted CAs (see Symantec) are vulnerable to human error. Just ask the owners of over 1 million certificates that were mistakenly issued by GoDaddy, Apple and Google with 63-bit serial numbers, instead of the 64-bits required by binding industry mandates. This is a direct violation of CA/B Forum Baseline Requirements and requires immediate action to revoke and replace all impacted certificates.

Kevin Bocek, vice president of security and threat intelligence for Venafi, explains why it is so important to hold CAs to such high standards, ‘Machine identities like TLS digital certificate establish what is good and trusted on the Internet, clouds, and business networks. Their powers are extreme and is so important they are being advertised more often on the dark web than ransomware and zero days.” Although the mis-issued certificates pose no immediate security risk, they are still technically vulnerable and must be replaced.


How can you choose a solution that delivers maximum crypto agility? See our buyer’s guide. 
 

Ars Technica explains the nature of the operational error:

“The snafu is the result of the companies' misconfiguration of the open source EJBCA software package that many browser-trusted authorities use to generate certificates that secure websites, encrypt email, and digitally sign code. By default, EJBCA generated certificates with 64-bit serial numbers, in keeping, it seemed, with an industry mandate that serial numbers contain 64 bits of output from a secure pseudo-random number generator. Upon further scrutiny, engineers discovered that one of the 64 bits must be a fixed value to ensure the serial number is a positive integer. As a result, the EJBCA default produced a serial number with 63 bits of entropy.”

As a result of this mass mis-issuance, organizations everywhere will be scrambling to find and replace these impacted certificates within the 5-day window that CAs have to revoke non-compliant certificates, as required by industry rules. For many, that simply won’t be possible. In an online forum, Daymion Reynolds, senior director of SSL/PKI security products at GoDaddy, commented that the company would not meet that deadline, but instead would try to reissue all the impacted certificates within the next 30 days.

Why will it take so long? Reynolds explained, “We have a significant number of customers that use manual methods for managing their certificates, so being agile for them is difficult. We want to keep our customers using https through the entire revocation period. Due to the large number of certificates and the benign nature of the issue, our plan is to revoke in a responsible way.”

The bottom line is that manual methods simply do not scale when you are forced to quickly replace larger numbers of certificates. Before you can revoke and reissue them, you need to find them. And if you are using a spreadsheet, your intelligence is only as good as the staffers who have updated it.

According to Kevin Bocek, “Most businesses lack the intelligence to know where they are using machine TLS digital certificates. Plus, they have no means to replace them with speed of automation expected now in digitally transformed businesses. Replacing a single digital certificate can take hours, is highly error prone, and can introduce new vulnerabilities if not done corrected—or cause business systems to fail and not work.”

The pain that this type of mistake causes organizations should not be taken lightly. And the elevated risks that result should be acknowledged at the highest levels of an organization. “It’s a huge third-party risk that most CISOs and boards must understand,” comments Bocek. “This is just one more reminder of why organizations need Machine Identity Protection to give them the intelligence and automation they need to control all their machine identities – including TLS digital certificates.”

Are you prepared to replace massive numbers of machine identities if the need arises?

Learn more about machine identity protection. Explore now.
 

Related posts

Subscribe to our Weekly Blog Updates!

Join thousands of other security professionals

Get top blogs delivered to your inbox every week

See Popular Tags

You might also like

encryption backdoor

Overheard in the Press: Encryption Backdoor Debate

 homme d'affaires debout dans une pièce avec les bras croisés, regardant un point d'interrogation

6 caractéristiques peu connues de vos certificats [et les raisons de leur importance]

 junger Geschäftsmann mit der Brille, die, stehend gegen eine weiße Backsteinmauer verwirrt schaut

Sechs Dinge, die Sie über Ihre Zertifikate wahrscheinlich nicht wissen (aber wissen sollten)

About the author

Scott Carter
Scott Carter

Scott is Senior Manager for Content Marketing at Venafi. With over 20 years in cybersecurity marketing, his expertise leads him to help large organizations understand the risk to machine identities and why they should protect them

Read Posts by Author
get-started-overlay close-overlay cross icon
get-started-overlay close-overlay cross icon
Venafi Risk assessment Form Image

Sign up for Venafi Cloud


Venafi Cloud manages and protects certificates



* Please fill in this field Please enter valid email address
* Please fill in this field Password must be
At least 8 characters long
At least one digit
At last one lowercase letter
At least one uppercase letter
At least one special character
(@%+^!#$?:,(){}[]~`-_)
* Please fill in this field
* Please fill in this field
* Please fill in this field
*

End User License Agreement needs to be viewed and accepted



Already have an account? Login Here

×
get-started-overlay close-overlay cross icon

How can we help you?

Thank you!

Venafi will reach out to you within 24 hours. If you need an immediate answer please use our chat to get a live person.

In the meantime, please explore more of our solutions

Explore Solutions

learn more

Email Us a Question

learn more

Chat With Us

learn more
Chat