Skip to main content
banner image
venafi logo

Google, Apple, GoDaddy Mis-issue Over 1 Million Faulty Certificates

Google, Apple, GoDaddy Mis-issue Over 1 Million Faulty Certificates

63-bit certificate snafu
March 12, 2019 | Scott Carter

The trust you place in your Certificate Authorities (CAs) can change in a heartbeat. Even the largest and most trusted CAs (see Symantec) are vulnerable to human error. Just ask the owners of over 1 million certificates that were mistakenly issued by GoDaddy, Apple and Google with 63-bit serial numbers, instead of the 64-bits required by binding industry mandates. This is a direct violation of CA/B Forum Baseline Requirements and requires immediate action to revoke and replace all impacted certificates.

Kevin Bocek, vice president of security and threat intelligence for Venafi, explains why it is so important to hold CAs to such high standards, ‘Machine identities like TLS digital certificate establish what is good and trusted on the Internet, clouds, and business networks. Their powers are extreme and is so important they are being advertised more often on the dark web than ransomware and zero days.” Although the mis-issued certificates pose no immediate security risk, they are still technically vulnerable and must be replaced.

Ars Technica explains the nature of the operational error:

“The snafu is the result of the companies' misconfiguration of the open source EJBCA software package that many browser-trusted authorities use to generate certificates that secure websites, encrypt email, and digitally sign code. By default, EJBCA generated certificates with 64-bit serial numbers, in keeping, it seemed, with an industry mandate that serial numbers contain 64 bits of output from a secure pseudo-random number generator. Upon further scrutiny, engineers discovered that one of the 64 bits must be a fixed value to ensure the serial number is a positive integer. As a result, the EJBCA default produced a serial number with 63 bits of entropy.”

As a result of this mass mis-issuance, organizations everywhere will be scrambling to find and replace these impacted certificates within the 5-day window that CAs have to revoke non-compliant certificates, as required by industry rules. For many, that simply won’t be possible. In an online forum, Daymion Reynolds, senior director of SSL/PKI security products at GoDaddy, commented that the company would not meet that deadline, but instead would try to reissue all the impacted certificates within the next 30 days.

Why will it take so long? Reynolds explained, “We have a significant number of customers that use manual methods for managing their certificates, so being agile for them is difficult. We want to keep our customers using https through the entire revocation period. Due to the large number of certificates and the benign nature of the issue, our plan is to revoke in a responsible way.”

The bottom line is that manual methods simply do not scale when you are forced to quickly replace larger numbers of certificates. Before you can revoke and reissue them, you need to find them. And if you are using a spreadsheet, your intelligence is only as good as the staffers who have updated it.

According to Kevin Bocek, “Most businesses lack the intelligence to know where they are using machine TLS digital certificates. Plus, they have no means to replace them with speed of automation expected now in digitally transformed businesses. Replacing a single digital certificate can take hours, is highly error prone, and can introduce new vulnerabilities if not done corrected—or cause business systems to fail and not work.”

The pain that this type of mistake causes organizations should not be taken lightly. And the elevated risks that result should be acknowledged at the highest levels of an organization. “It’s a huge third-party risk that most CISOs and boards must understand,” comments Bocek. “This is just one more reminder of why organizations need Machine Identity Protection to give them the intelligence and automation they need to control all their machine identities – including TLS digital certificates.”

Are you prepared to replace massive numbers of machine identities if the need arises?

Related posts

Subscribe to our Weekly Blog Updates!

Join thousands of other security professionals

Get top blogs delivered to your inbox every week

See Popular Tags

You might also like

Déjà Vu at LinkedIn: Second TLS Certificate Expiry in 2 Years

Déjà Vu at LinkedIn: Second TLS Certificate Expiry in 2 Years

Prepare this presentation and send it to me, once approved you can teach entire team.

Overheard at Machine Identity Protection Global Summit 2019

machine identity protection

Leaders Underscore the Critical Nature of Machine Identity Protection at Inaugural Global Summit

About the author

Scott Carter
Scott Carter

Scott Carter writes for Venafi's blog and is an expert in machine identity protection.

Read Posts by Author
get-started-overlay close-overlay cross icon
get-started-overlay close-overlay cross icon
Venafi Risk assessment Form Image

Sign up for Venafi Cloud


Venafi Cloud manages and protects certificates



* Please fill in this field Please enter valid email address
* Please fill in this field Password must be
At least 8 characters long
At least one digit
At last one lowercase letter
At least one uppercase letter
At least one special character
(@%+^!#$?:,(){}[]~`-_)
* Please fill in this field
* Please fill in this field
* Please fill in this field
*

End User License Agreement needs to be viewed and accepted



Already have an account? Login Here

×
get-started-overlay close-overlay cross icon

How can we help you?

Thank you!

Venafi will reach out to you within 24 hours. If you need an immediate answer please use our chat to get a live person.

In the meantime, please explore more of our solutions

Explore Solutions

learn more

Email Us a Question

learn more

Chat With Us

learn more
Chat