Other browser makers follow Google's lead, revoke rogue certificates

Microsoft, Mozilla and Opera nullify unauthorized French certificates; Windows XP users out of luck

Microsoft, Mozilla and Opera Software today joined Google in revoking rogue digital certificates that had been issued by a subordinate certificate authority (CA) of France's cybersecurity agency.

Google revoked the certificates for users of its Chrome browser on Saturday after a four-day investigation. Microsoft, Mozilla and Opera Software followed suit on Monday.

In a security advisory, Microsoft said it had released an update to most versions of Windows -- including Windows Phone 8, Windows 8.1 and Windows Server 2012 R2 -- that revoked the pertinent certificates. Unlike other browser makers, Microsoft records trusted digital certificates in Windows, not in its Internet Explorer (IE) browser.

However, the third of Windows PC owners still running the 12-year-old Windows XP have been left out in the cold. "No update is available at this time for customers running Windows XP and Windows Server 2003," Microsoft said in its advisory.

Google's discovery also prompted Mozilla to annul the rogue certificates. The revocations will be included with Firefox 26, which is slated to ship on Tuesday, Mozilla said in a blog post today.

Opera Software blacklisted the certificates in older versions of its Opera browser. The Norwegian company's newest, Opera 12, did not require an update because that version did not automatically trust ANSSI (Agence nationale de la scurit des systmes d'information), the French Network and Information Security Agency whose intermediate CA issued the original unauthorized certificate.

According to ANSSI, the certificates were signed by DGTrsor, France's Department of the Treasury. ANSSI described the gaffe as "human error ... during a process aimed at strengthening the overall IT security of the French Ministry of Finance."

According to Google and Mozilla, ANSSI found that a secondary certificate was installed on a network monitoring device, and able to sniff local traffic to and from third-party sites. Microsoft warned that, "An attacker could use these certificates to spoof content, perform phishing attacks, or perform man-in-the-middle attacks" against a large number of Google-owned domains, including google.com and youtube.com.

The browser makers' fast response was in contrast to similar incidents in the past, when certificate invalidation took longer. An intermediate certificate issued by Turkish CA Turktrust in mid-2011 and installed on a firewall appliance in December 2012 was not revoked by Microsoft and others until early January 2013.

Like the ANSSI-backed rogue certificate, Turktrust's was able to spoof various Google domains.

In February 2012, another CA, Trustwave, admitted it had issued a certificate that allowed spying on SSL-secured traffic within a local network.

Gregg Keizer covers Microsoft, security issues, Apple, Web browsers and general technology breaking news for Computerworld. Follow Gregg on Twitter at @gkeizer, on Google+ or subscribe to Gregg's RSS feed. His email address is gkeizer@computerworld.com.

See more by Gregg Keizer on Computerworld.com.

Read more about security in Computerworld's Security Topic Center.

Join the Computerworld Australia group on Linkedin. The group is open to IT Directors, IT Managers, Infrastructure Managers, Network Managers, Security Managers, Communications Managers.

More about: Apple, Google, Microsoft, Mozilla, Opera Software, Topic, Trustwave
Comments are now closed.
Related Coverage
Related Whitepapers
Latest Stories
Community Comments
Tags: Firefox, Google, security, Microsoft, opera software, internet, mozilla
Whitepapers
All whitepapers

Amazon vs. Google vs. Windows Azure: Cloud computing speed showdown

READ THIS ARTICLE
DO NOT SHOW THIS BOX AGAIN [ x ]
Sign up now to get free exclusive access to reports, research and invitation only events.

Computerworld newsletter

Join the most dedicated community for IT managers, leaders and professionals in Australia