Hacker Newsnew | past | comments | ask | show | jobs | submitlogin
Private key of DigiCert Certificate Transparency log compromised (feistyduck.com)
79 points by CiPHPerCoder on May 28, 2020 | hide | past | favorite | 39 comments


This was reported first at the begining of May. They got into the server via that Salt vuln and just ran crypto miners on the server, they didn't (as far as anyone knows) use the keys to do anything bad. From the original email reporting the problem:

(the attacker doesn't seem to realize that they gained access to the keys and were running other services on the instracture)


Nobody knows for sure what they were doing since the script dropped via the salt vulnerability downloaded new scripts and executed them every 60 seconds. Just because all they found were crypto miners doesn't mean it was the only thing it was doing. And also there were multiple groups exploiting this vulnerability at the same time as was evidenced in one of the scripts trying to detect and eliminate competing scripts dropped by someone else


Cryptocurrency continues to improve security by polluting attackers with short-sighted incentives that prevent real damage from occurring.


3 max-expensive "analytics" servers were how my company discovered a breach. "Why is our cost projected to go up so significantly?"

They were of course mining on GPUs.


I don't think cryptocurrency has changed much in that regard. Before CC mining the default use for an owned box was warez servers, IRC or jump hosts.


Those are much harder to detect, especially the latter two.


I'm not sure. Most crackers don't use port knocking or other obfuscation techniques, so something that shouldn't be listening on a box and a large amount of bandwidth being used is normally a good indicator.


I think there's great overlap between servers that aren't monitored and servers that are vulnerable to exploits. If you're monitoring your servers for unknown listening ports, chances are you're keeping your systems up to date. Same with bandwidth, although if bandwidth is expensive (eg. cloud providers), your accounting dept might notice.


> I think there's great overlap between servers that aren't monitored and servers that are vulnerable to exploits.

Agreed. CC mining would be CPU on most servers, and go undetected for the same reasons. Some servers and gaming rigs would have GPUs, but not many vs CPUs.


Two approaches to doing nasty things on other people's servers: 1) be very quiet and try not to get caught at all. 2) be very noisy doing something "innocent" like running a bitcoin miner.

If you do not assume that everything bad that could have happened, did happen, then you will have some interesting explaining to do later, with lawyers.


See also https://news.ycombinator.com/item?id=23062904 from a few weeks ago.


The problem with Transparent Logs / Certificate Transparency is that they don't have the best story with regarding to recovering from compromise. We wrote an article comparing The Update Framework (TUF) to CT/TL:

https://ssl.engineering.nyu.edu/blog/2020-02-03-transparent-...


Your blog post is about yet another X Transparency, rather than about Certificate Transparency. Because CT works well people tried to apply the same approach to lots of other problems, most of them obviously dumb.

CT is a narrow solution to a narrow problem. We had that specific problem, and so this is a very good solution. You almost certainly don't have that problem, our solution can't help you, we aren't sorry about that.


Strange comment. I'm not sorry you're not sorry either.


As I understand it, this is not a big deal: there are multiple CT servers, and auditors verifying their entries, the design of the system assumes the possibility of compromised log operators.


Correct. It's an interesting incident, but the consequences for Internet users are pretty much zero.

(Conversely, multiple CT server compromises would be a significant concern, but even then without a compromised Certificate Authority, the impact is almost zero.)


Well the political consequences are kind of bad. CA system is built around trust. Not being able to secure their servers, even non critical ones, degrades trust.


The CT system is built around controlled suspicion, not trust.


Sure, but if i can't trust someone to run a CT server, why would i trust them to run a CA?


It was a 0day in a popular open source package. They didn't do anything wrong. Presumably they use stronger defense in depth, as required by the CA guidelines, to prevent software compromises to the actual CA signing machines. There's no need to go through that level of paranoia for CT log machines.


This is a little bit of old news and sounds worse than it is. There are plenty of checks and redundancy operators in the CA auth universe.


This CA system is designed for maximum reduction in security - not defense in depth. The company with the least security defines the security of the entire CA system.

It’s time for DANE [1]. We don’t need any more “men in the middle.”

[1] https://en.wikipedia.org/wiki/DNS-based_Authentication_of_Na...


I'm pretty sure the SCT requirement contained the blast radius of this compromise to avoid anyone from actually being affected by it, so your comment doesn't really follow here.

Also, DANE relies on DNSSEC [1], which is bad.

https://sockpuppet.org/blog/2015/01/15/against-dnssec


Agree with you, it's entirely incorrect that a CT log operator "defines the security of the entire CA system". They can't issue certs and their output is already regarded with suspicion by default.


> I'm pretty sure the SCT requirement contained the blast radius of this compromise to avoid anyone from actually being affected by it, so your comment doesn't really follow here.

I think this would be true except my statement wasn't just about SCT but the CA system in general. Furthermore, browsers like Firefox [1] do not even have CT checks.

> Also, DANE relies on DNSSEC [1], which is bad.

Handshake completes this system [2].

[1] https://bugzilla.mozilla.org/show_bug.cgi?id=1281469

[1a] https://developer.mozilla.org/en-US/docs/Web/Security/Certif...

[2] https://github.com/handshake-org/hdns


Despite being supported, relying on browsers checking CT logs was never something that what going to be deployed at scale because, just like revocation lists, it adds a performance hurdle to every request.

Auditors and monitors are the real protection you get from CT logs.

You get the same problem with any form of DNS validation because you'll never get every little caching server to validate records.


Just so everyone's clear about this, Handshake is a system backed by a cryptocurrency, "HNS", that is actively traded despite being useful only to speculators. Its backers believe that they'll take over control of the Internet and be rewarded financially for it through their currency.

If that works, I call ARPcoin next.


Ah hello 2015, my old friend.

DNSSEC is a Government-Controlled PKI -> Not if the root of trust is secured by a proof-of-work blockchain

DNSSEC is Cryptographically Weak -> Not if zone operators upgrade to ECDSA as defined for DNSSEC in https://tools.ietf.org/html/rfc6605

DNSSEC is Unsafe -> NSEC3 is mentioned by the article itself

DNSSEC is Expensive To Deploy -> We can make tools for this, so much has gotten easier already

DNSSEC is Incomplete -> Agreed, we need browser adoption


> Not if the root of trust is secured by a proof-of-work blockchain

https://tonyarcieri.com/on-the-dangers-of-a-blockchain-monoc...

https://paragonie.com/blog/2017/07/chronicle-will-make-you-q...

> Not if zone operators upgrade to ECDSA as defined for DNSSEC in https://tools.ietf.org/html/rfc6605

First: That's a big "if". Lots of RSA legacy support.

Furthermore, ECDSA is so bad that Ed25519 and Ed448 are even coming to FIPS 186-5 later this year.

Citing ECDSA adoption in DNSSEC doesn't make as strong of a case as you might think.


For context, some statistics:

"Currently [2018], in more than 90% of cases if a user passes DNS queries to a resolver that performs DNSSEC validation of an RSA digital signature the same resolver will also perform DNSSEC validation of ECDSA P-256 digital signatures."

https://blog.apnic.net/2018/08/23/measuring-ecdsa-in-dnssec-...

"Since the second quarter of 2019 [to the first quarter of 2020], the population of [strict DNSSEC] validating users has risen from 12% to 22%, close to doubling. At the same time, the proportion of [non-strict DNSSEC validating] users has risen from 5% to 10%."

https://blog.apnic.net/2020/03/02/dnssec-validation-revisite...


A better argument against the preposterous claim that DNSSEC is "government-controlled" (and one that doesn't rely on blockchains, which are controversial in their own right), is that with DNSSEC you can choose which government (i.e. ccTLD) your domain is under, or choose one of the many generic TLDs.

The web PKI, by contrast, requires users to trust a bunch of CAs, any one of which could have been compromised by a government and can issue a certificate for your domain. Also, if a government can compromise your DNS records, they can also be granted domain-validated certificates for those domains, so the web PKI is not an improvement.

Anyway, if your threat model is that every single country in the world is willing to subvert the security of their own DNS hierarchy specifically to attack you, then the limitations of DNSSEC are the least of your worries.


With DNSSEC, when it becomes instantly clear that the United States Government controls .COM, Google can simply leave .COM, and tell every Google user in the United States never to use the tainted GOOGLE.COM domain, and all the users will stop using .COM and start using the new Google domain name, because that is how things work in the real world.


Yeah, imagine the hours of productivity that will be lost as people in the US update their link to Google in their IE6 "Favorites" list, because that's how things work in the real world.

In contrast, when it becomes clear that the United States Government controls multiple certificate authorities, that won't be a problem for any websites.


With the CT system I can monitor the CA's issuance, with DNSSEC I can't retroactively monitor if someone has changed the DANE keys and intercepted traffic.


True, DNSSEC Transparency is not as developed a technology as Certificate Transparency. There has been experimental deployment of such a system[0] but to give higher assurance there is a small addition to the DNS data that needs to be adopted first[1], which is still going through the IETF process.

[0] https://twitter.com/ln4711/status/754516056878772224

[1] https://datatracker.ietf.org/doc/html/draft-ietf-dnsop-deleg...


Certificate Transparency, by contrast, exists.


There was a time when Certificate Transparency didn't exist, and people didn't propose throwing away the web PKI because of that.


Yeah, because Web PKI existed, DNSSEC has yet to gather any meaningful good deployment. It's not hard to throw away something that doesn't exist :P


How would you monitor that your DNS provider hasn't changed your DANE records and intercepted traffic?




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: