TE
科技回声
首页24小时热榜最新最佳问答展示工作
GitHubTwitter
首页

科技回声

基于 Next.js 构建的科技新闻平台,提供全球科技新闻和讨论内容。

GitHubTwitter

首页

首页最新最佳问答展示工作

资源链接

HackerNews API原版 HackerNewsNext.js

© 2025 科技回声. 版权所有。

DigiCert Revocation Incident (CNAME Domain Validation)

141 点作者 vitaliyf10 个月前

8 条评论

agwa10 个月前
&gt; <i>The underscore prefix ensures that the random value cannot collide with an actual domain name that uses the same random value. While the odds of that happening are practically negligible, the validation is still deemed as non-compliant if it does not include the underscore prefix.</i><p>That&#x27;s not the rationale for mandating the underscore prefix. The actual reason is so services that allow users to create DNS records at subdomains (e.g. dynamic DNS services) can block users from registering subdomains starting with an underscore. It serves the same purpose that &#x2F;.well-known does.<p>For example, if an attacker requests a certificate for dyndns.example and DigiCert gives them a record without an underscore prefix like da39a3ee5e6b4b0d3255bfef95601890afd80709.dyndns.example, they can register that subdomain with the dynamic DNS provider, publish the required record, and get the certificate for dyndns.example. It doesn&#x27;t matter how much entropy DigiCert put in the record name.<p>I definitely commend DigiCert for pledging to revoke the certificates within 24 hours and not having a delayed revocation or trying to language lawyer their way to a 5 day revocation as other CAs have tried. Nevertheless, this post severely minimizes the security impact of their mistake, and provides an excellent example of why CAs should always be required to strictly adhere to the rules and not be permitted to excuse noncompliance based on their own security analysis.
评论 #41107483 未加载
评论 #41113663 未加载
kevinday10 个月前
<a href="https:&#x2F;&#x2F;bugzilla.mozilla.org&#x2F;show_bug.cgi?id=1910322" rel="nofollow">https:&#x2F;&#x2F;bugzilla.mozilla.org&#x2F;show_bug.cgi?id=1910322</a><p>for more background. The short story is that when doing CNAME based validation, they were supposed to put an underscore at the start of the random string for you to add to your DNS records. They still generated sufficiently random strings but didn&#x27;t include a _ before it which is in violation of the RFC. The rationale is that some sites might do something like give you control of yourusername.example.com and they don&#x27;t want to make it possible for random users to register the random string and be able to manipulate it. If you don&#x27;t allow users to generate anything that causes a hostname to appear with a leading underscore, they can&#x27;t pass the domain validation.
评论 #41105286 未加载
olliej10 个月前
One of the impacted companies filed a restraining order, because they believe their incompetence is more important than basic functionality of the PKI. Can&#x27;t wait to hear how they expect to respond if they ever have encounter a cert compromise or actual misissuance, maybe they&#x27;ll demand 24 hour revocation in that case?<p>Honestly my opinion is that this should trigger the company being banned by all CAs.<p>The company in question is Alegeus Technologies LLC: <a href="https:&#x2F;&#x2F;www.courtlistener.com&#x2F;docket&#x2F;68995396&#x2F;alegeus-technologies-llc-v-digicert&#x2F;" rel="nofollow">https:&#x2F;&#x2F;www.courtlistener.com&#x2F;docket&#x2F;68995396&#x2F;alegeus-techno...</a><p>From basic googling it looks like a healthcare provider, so exactly the kind of company you would want to have shitty IT and security infrastructure. A++ work. Absolutely stellar.
jiggawatts10 个月前
I just want to call out both CrowdStrike and DigiCert for being one of &quot;those&quot; companies that insist on publishing critical support information behind a login with <i>the clock ticking</i> on a global outage of their own making.<p>There are no polite words that I can use to accurately convey the depth of my disappointment at this kind of inconsiderate behaviour during a crisis, so I won&#x27;t say anything more.
评论 #41108097 未加载
评论 #41107743 未加载
评论 #41108399 未加载
ratg1310 个月前
24h notice to change certificates in who knows how many systems, at the worlds largest companies, while everyone is on vacation.<p>This will be interesting.
评论 #41110263 未加载
256_10 个月前
&gt; While we had regression testing in place, those tests failed to alert us to the change in functionality because the regression tests were scoped to workflows and functionality instead of the content&#x2F;structure of the random value. [...]<p>&gt; Unfortunately, no reviews were done to compare the legacy random value implementations with the random value implementations in the new system for every scenario.<p>In other words, they didn&#x27;t do proper testing. At the bottom of the article they suggest they&#x27;re going to improve it.
Apfel10 个月前
Is this a potential cause of the current Azure outages hitting western europe? I know DigiCert are used by Azure extensively...
评论 #41109237 未加载
notemaker10 个月前
Can someone explain why this issue deserves a 24h notice?<p>Seems more reasonable to me to have a much longer deprecation notice.
评论 #41131866 未加载