Mozilla debates punishment for the issuing of a subordinate root certificate that let company snoop on SSL-encrypted traffic
Digital Certificate Authority (CA) Trustwave revealed that it has issued a digital certificate that enabled an unnamed private company to spy on SSL-protected connections within its corporate network, an action that prompted the Mozilla community to debate whether the CA’s root certificate should be removed from Firefox.
The certificate issued by Trustwave is known as a subordinate root and enabled its owner to sign digital certificates for virtually any domain on the Internet. The certificate was to be used within a private network within a data loss prevention system, Trustwave said in a blog post on Saturday.
[ Get your websites up to speed with HTML5 today using the techniques in InfoWorld’s HTML5 Deep Dive PDF how-to report. | Learn how to secure your Web browsers in InfoWorld’s “Web Browser Security Deep Dive” PDF guide. ]
The CA took steps to ensure that the subordinate root could not be stolen or abused. The certificate was stored in a Hardware Security Module, a device built specifically for the management of digital keys, which ensured that its extraction was impossible, Trustwave said.
The company also performed on-site physical security audits to make sure that the system can’t be removed from the premises and used to intercept SSL-encrypted (Secure Sockets Layer-encrypted) traffic on another network.
“We did not create a system where the customer could generate ad-hoc SSL certificates AND extract the private keys to be used outside this device,” said Brian Trzupek, Trustwave’s vice president for managed identity and authentication, in a discussion on Mozilla’s bug tracker on Tuesday. “Nor could the subordinate root key ever get exported from the device.”
Mozilla’s community is currently debating whether the issuing of such certificates represents a breach of the software vendor’s CA Certificate Policy, regardless of what security measures were put in place. CAs adhere to this Policy in order to have their root certificates trusted by Mozilla’s products.
“We reserve the right to not include a particular CA certificate in our software products. This includes (but is not limited to) cases where we believe that including a CA certificate (or setting its “trust bits” in a particular way) would cause undue risks to users’ security, for example, with CAs that knowingly issue certificates without the knowledge of the entities whose information is referenced in the certificates,” the Mozilla’s CA Certificate Policy states.
Some users are asking Mozilla to remove Trustwave’s root certificate from Firefox and Thunderbird because domain name owners were not aware that Trustwave was re-signing certificates in their name through a subordinate root. Mozilla did not immediately return a request for comment.
Trustwave defended itself by saying that the issuing of subordinate roots to private companies, so they can inspect the SSL-encrypted traffic that passes through their networks, is a common practice in the industry. However, the CA decided to stop issuing such certificates in the future and revoke the existent ones.
View full post on National Cyber Security