Movatterモバイル変換


[0]ホーム

URL:


Jump to content
WikipediaThe Free Encyclopedia
Search

DigiNotar

From Wikipedia, the free encyclopedia
Former certificate authority
DigiNotar BV
Company typeSubsidiary of a publicly traded company
IndustryInternet security
Founded1998 (1998)
FounderDick Batenburg
Defunct20 September 2011 (2011-09-20)
Fateacquired byVASCO Data Security International, Inc. in 2010; declared bankrupt in 2011
Headquarters,
ProductsPublic key certificates
ServicesCertificate authority
OwnerVASCO Data Security International
Websitediginotar.nl at theWayback Machine (archived 27 April 2008)

DigiNotar was a Dutchcertificate authority, established in 1998 and acquired in January 2011 byVASCO Data Security International, Inc.[1][2] The company was hacked in June 2011 and it issued hundreds of fakecertificates, some of which were used forman-in-the-middle attacks on IranianGmail users. The company was declared bankrupt in September 2011.

Overview

[edit]

On 3 September 2011, after it had become clear that a security breach had resulted in thefraudulent issuing ofcertificates, theDutch government took over operational management of DigiNotar's systems.[3] That same month, the company was declared bankrupt.[4][5]

An investigation into the hacking by Dutch-government appointed Fox-IT consultancy identified 300,000IranianGmail users as the main target of the hack (targeted subsequently usingman-in-the-middle attacks), and suspected that the Iranian government was behind the hack.[6] While nobody has been charged with the break-in and compromise of the certificates (as of 2013[update]), cryptographerBruce Schneier says the attack may have been "either the work of theNSA, or exploited by the NSA."[7] However, this has been disputed, with others saying the NSA had only detected a foreignintelligence service using the fake certificates.[8] The hack has also been claimed by the so-called Comodohacker, allegedly a 21-year-old Iranian student, who also claimed to have hacked four other certificate authorities, includingComodo, a claim found plausible byF-Secure, although not fully explaining how it led to the subsequent "widescale interception of Iranian citizens".[9]

After more than 500 fake DigiNotar certificates were found, major web browser makers reacted by blacklisting all DigiNotar certificates.[10] The scale of the incident was used by some organizations likeENISA andAccessNow.org to call for a deeper reform ofHTTPS in order to remove the weakest link possibility that a single compromised CA can affect that many users.[11][12]

Company

[edit]

DigiNotar's main activity was as acertificate authority, issuing two types of certificate. First, they issued certificates under their own name (where the root CA was "DigiNotar Root CA").[13]Entrust certificates were not issued since July 2010, but some were still valid up to July 2013.[14][15] Secondly, they issued certificates for the Dutch government'sPKIoverheid ("PKIgovernment") program. This issuance was via two intermediate certificates, each of which chained up to one of the two "Staat der Nederlanden" root CAs. National and local Dutch authorities and organisations offering services for the government who want to use certificates for secure internet communication can request such a certificate. Some of the most-used electronic services offered by Dutch governments used certificates from DigiNotar. Examples were the authentication infrastructureDigiD and the central car-registration organisationNetherlands Vehicle Authority [nl] (RDW).

DigiNotar's root certificates were removed from the trusted-root lists of all major web browsers and consumer operating systems on or around 29 August 2011;[16][17][18] the "Staat der Nederlanden" roots were initially kept because they were not believed to be compromised. However, they have since been revoked.

History

[edit]

DigiNotar was originally set up in 1998 by the Dutchnotary Dick Batenburg fromBeverwijk and theKoninklijke Notariële Beroepsorganisatie [nl], the national body for Dutchcivil law notaries. The KNB offers all kind of central services to the notaries, and because many of the services that notaries offer are official legal procedures, security in communications is important. The KNB offered advisory services to their members on how to implement electronic services in their business; one of these activities was offering secure certificates.

Dick Batenburg and the KNB formed the group TTP Notarissen (TTP Notaries), where TTP stands fortrusted third party. A notary can become a member of TTP Notarissen if they comply with certain rules. If they comply with additional rules on training and work procedures, they can become an accredited TTP Notary.[19]

Although DigiNotar had been a general-purpose CA for several years, they still targeted the market for notaries and other professionals.

On 10 January 2011 the company was sold to VASCO Data Security International.[1] In a VASCO press release dated 20 June 2011, one day after DigiNotar first detected an incident on their systems[20] VASCO's president andCOO Jan Valcke is quoted as stating "We believe that DigiNotar's certificates are among the most reliable in the field."[21]

Bankruptcy

[edit]

On 20 September 2011 Vasco announced that its subsidiary DigiNotar was declared bankrupt after filing forvoluntary bankruptcy at theHaarlemcourt. Effective immediately the court appointed areceiver, a court-appointed trustee who takes over the management of all of DigiNotar's affairs as it proceeds through the bankruptcy process toliquidation.[4][22]

Refusal to publish report

[edit]
This sectionneeds additional citations forverification. Please helpimprove this article byadding citations to reliable sources in this section. Unsourced material may be challenged and removed.(April 2017) (Learn how and when to remove this message)

Thecurator (court-appointed receiver) didn't want the report fromITSec to be published, as it might lead to additional claims towards DigiNotar.[citation needed] The report covered the way the company operated and details of the hack of 2011 that led to its bankruptcy.[citation needed]

The report was made on request of the Dutch supervisory agencyOPTA who refused to publish the report in the first place. In afreedom of information (Wet openbaarheid van bestuur [nl]) procedure started by a journalist, the receiver tried to convince the court not to allow publication of this report, and to confirm the OPTA's initial refusal to do so.[23]

The report was ordered to be released, and was made public in October 2012. It shows a near total compromise of the systems.

Issuance of fraudulent certificates

[edit]

On 10 July 2011 an attacker with access to DigiNotar's systems issued awildcardcertificate forGoogle. This certificate was subsequently used by unknown persons inIran to conduct aman-in-the-middle attack against Google services.[24][25] On 28 August 2011 certificate problems were observed on multipleInternet service providers in Iran.[26] The fraudulent certificate was posted onPastebin.[27] According to a subsequent news release by VASCO, DigiNotar had detected an intrusion into its certificate authority infrastructure on 19 July 2011.[28] DigiNotar did not publicly reveal the security breach at the time.

After this certificate was found, DigiNotar belatedly admitted dozens of fraudulent certificates had been created, including certificates for the domains ofYahoo!,Mozilla,WordPress andThe Tor Project.[29] DigiNotar could not guarantee all such certificates had beenrevoked.[30] Googleblacklisted 247 certificates inChromium,[31] but the final known total of misissued certificates is at least 531.[32] Investigation byF-Secure also revealed that DigiNotar's website had been defaced by Turkish and Iranian hackers in 2009.[33]

In reaction, Mozilla revoked trust in the DigiNotar root certificate in all supported versions of itsFirefox browser andMicrosoft removed the DigiNotar root certificate from its list of trusted certificates with its browsers on all supported releases of Microsoft Windows.[34][35]Chromium /Google Chrome was able to detect the fraudulent*.google.com certificate, due to its "certificate pinning" security feature;[36] however, this protection was limited to Google domains, which resulted in Google removing DigiNotar from its list of trusted certificate issuers.[24]Opera always checks the certificate revocation list of the certificate's issuer and so they initially stated they did not need a security update.[37][38] However, later they also removed the root from their trust store.[39] On 9 September 2011Apple issued Security Update 2011-005 forMac OS X 10.6.8 and 10.7.1, which removes DigiNotar from the list of trusted root certificates and EV certificate authorities.[40] Without this update,Safari and Mac OS X do not detect the certificate's revocation, and users must use theKeychain utility to manually delete the certificate.[41] Apple did not patch iOS until 13 October 2011, with the release of iOS 5.[42]

DigiNotar also controlled an intermediate certificate which was used for issuing certificates as part of theDutch government’spublic key infrastructure "PKIoverheid" program, chaining up to the official Dutch government certification authority (Staat der Nederlanden).[43] Once this intermediate certificate was revoked or marked as untrusted by browsers, thechain of trust for their certificates was broken, and it was difficult to access services such as theidentity management platformDigiD and theTax and Customs Administration.[44]GOVCERT.NL [nl], the Dutchcomputer emergency response team, initially did not believe the PKIoverheid certificates had been compromised,[45] although security specialists were uncertain.[30][46] Because these certificates were initially thought not to be compromised by the security breach, they were, at the request of the Dutch authorities, kept exempt from the removal of trust[43][47] – although one of the two, the active "Staat der Nederlanden - G2" root certificate, was overlooked by the Mozilla engineers and accidentally distrusted in the Firefox build.[48] However, this assessment was rescinded after an audit by the Dutch government, and the DigiNotar-controlled intermediates in the "Staat der Nederlanden" hierarchy were also blacklisted by Mozilla in the next security update, and also by other browser manufacturers.[49] The Dutch government announced on 3 September 2011 that they would switch to a different firm as certificate authority.[50]

Steps taken by the Dutch government

[edit]

After the initial claim that the certificates under the DigiNotar-controlled intermediate certificate in thePKIoverheid hierarchy weren't affected, further investigation by an external party, the Fox-IT consultancy, showed evidence of hacker activity on those machines as well. Consequently, the Dutch government decided on 3 September 2011 to withdraw their earlier statement that nothing was wrong.[51] (The Fox-IT investigators dubbed the incident "Operation Black Tulip".[52]) The Fox-IT report identified 300,000 Iranian Gmail accounts as the main victims of the hack.[6]

DigiNotar was only one of the available CAs in PKIoverheid, so not all certificates used by the Dutch government under their root were affected. When the Dutch government decided that they had lost their trust in DigiNotar, they took back control over the company's intermediate certificate in order to manage an orderly transition, and they replaced the untrusted certificates with new ones from one of the other providers.[51] The much-used DigiD platform now[when?] uses a certificate issued byGetronics PinkRoccade Nederland B.V.[53] According to the Dutch government, DigiNotar gave them its full co-operation with these procedures.

After the removal of trust in DigiNotar, there are now[when?] fourCertification Service Providers (CSP) that can issue certificates under thePKIoverheid hierarchy:[54]

  • Digidentity[55]
  • ESG or De Electronische Signatuur[56]
  • QuoVadis[57]
  • KPN Certificatiedienstverlening

All four companies have opened special help desks and/or published information on their websites as to how organisations that have a PKIoverheid certificate from DigiNotar can request a new certificate from one of the remaining four providers.[55][56][57][58]

See also

[edit]

References

[edit]
  1. ^ab"VASCO Data Security International, Inc. announces the acquisition of DigiNotar B.V., a market leader in Internet trust services in the Netherlands" (Press release).VASCO. January 10, 2011. Archived fromthe original on September 17, 2011. RetrievedAugust 31, 2011.
  2. ^van der Meulen, Nicole (June 2013)."DigiNotar: Dissecting the First Dutch Digital Disaster".Journal of Strategic Security.6 (2):46–58.doi:10.5038/1944-0472.6.2.4.ISSN 1944-0464.
  3. ^Website GovcertFactsheet discovery fraudulent certificatesArchived October 8, 2011, at theWayback Machine. Retrieved September 6, 2011.
  4. ^ab"VASCO Announces Bankruptcy Filing by DigiNotar B.V." (Press release). VASCO Data Security International. September 20, 2011. Archived fromthe original on September 23, 2011. RetrievedSeptember 20, 2011.
  5. ^Wolff, Josephine (2016-12-21)."How a 2011 Hack You've Never Heard of Changed the Internet's Infrastructure".Slate.ISSN 1091-2339. Retrieved2023-06-30.
  6. ^abGregg Keizer (2011-09-06)."Hackers spied on 300,000 Iranians using fake Google certificate".Computerworld.Archived from the original on February 2, 2014. RetrievedJanuary 24, 2014.
  7. ^"New NSA Leak Shows Man-In-The-Middle Attacks Against Major Internet Services". September 13, 2013.Archived from the original on September 20, 2013. RetrievedSeptember 14, 2013.
  8. ^Rouwhorst, Koen (September 14, 2013)."No, the NSA was not behind the DigiNotar hack".Archived from the original on November 20, 2013. RetrievedNovember 19, 2013.
  9. ^"Comodo hacker claims credit for DigiNotar attack". PC World Australia. 2011-09-06.Archived from the original on February 2, 2014. RetrievedJanuary 24, 2014.
  10. ^Bright, Peter (September 6, 2011)."Comodo hacker: I hacked DigiNotar too; other CAs breached".Ars Technica.Archived from the original on April 17, 2012. RetrievedApril 29, 2019.
  11. ^"Operation Black Tulip: Certificate authorities lose authority".www.enisa.europa.eu.Archived from the original on April 22, 2014. RetrievedJanuary 24, 2014.
  12. ^"The weakest link in the chain: Vulnerabilities in the SSL certificate authority system and what should be done about them. An Access Policy Brief Regarding the Consequences of the DigiNotar breach for Civil Society and Commercial Enterprise"(PDF).Archived(PDF) from the original on October 6, 2018. RetrievedFebruary 20, 2019.
  13. ^"Overzicht actuele rootcertificaten" [Survey of current root certificates] (in Dutch). DigiNotar. Archived fromthe original on August 31, 2011. RetrievedSeptember 12, 2011.
  14. ^"Entrust in relation with Diginotar". Ssl.entrust.net. September 14, 2011. Archived fromthe original on April 2, 2012. RetrievedFebruary 1, 2012.
  15. ^A print screen of a Diginotar certificate under the Entrust chain
  16. ^"Microsoft Security Advisory 2607712".technet.microsoft.com.Archived from the original on June 10, 2016. Retrieved2016-06-16.
  17. ^"An update on attempted man-in-the-middle attacks".Google Online Security Blog.Archived from the original on June 10, 2016. Retrieved2016-06-16.
  18. ^"Fraudulent *.google.com Certificate".Mozilla Security Blog.Archived from the original on May 25, 2022. Retrieved2016-06-16.
  19. ^Website Diginotar onTTP NotarissenArchived August 31, 2011, at theWayback Machine.
  20. ^FOX-IT Interim Report, v1.0Archived April 21, 2015, at theWayback Machine (but before any certificates were misissued), Timeline, page 13. Retrieved September 5, 2011.
  21. ^"VASCO Tackles Global SSL-Certificate Market".MarketWatch. June 20, 2011.
  22. ^Pressrelease Court of Haarlem onDigiNotarArchived September 24, 2011, at theWayback Machine, 20 September 2011. Retrieved September 27, 2011.
  23. ^Newssite nu.nl:Receiver afraid of more claimsArchived June 30, 2012, at theWayback Machine (Dutch), 22 June 2012. Visited: 25 June 2012.
  24. ^abHeather Adkins (August 29, 2011)."An update on attempted man-in-the-middle attacks".Archived from the original on September 13, 2011. RetrievedAugust 30, 2011.
  25. ^Elinor Mills."Fraudulent Google certificate points to Internet attack".Archived October 8, 2011, at theWayback MachineCNET, 8/29/2011.
  26. ^Charles Arthur (August 30, 2011)."Faked web certificate could have been used to attack Iran dissidents".The Guardian.Archived from the original on August 26, 2017. RetrievedAugust 30, 2011.
  27. ^"Fraudulent certificate triggers blocking from software companies". Heise Media UK Ltd. August 30, 2011. Archived fromthe original on April 28, 2012.
  28. ^"DigiNotar reports security incident". VASCO Data Security International. August 30, 2011. Archived fromthe original on August 31, 2011. RetrievedSeptember 1, 2011.
  29. ^"Mogelijk nepsoftware verspreid naast aftappen Gmail". Sanoma Media Netherlands groep. August 31, 2011.Archived from the original on December 4, 2011. RetrievedAugust 31, 2011.
  30. ^ab"DigiNotar: mogelijk nog valse certificaten in omloop". IDG Nederland. August 31, 2011.Archived from the original on February 10, 2012. RetrievedAugust 31, 2011.
  31. ^Keizer, Gregg (August 31, 2011)."Hackers may have stolen over 200 SSL certificates". F-Secure.Archived from the original on September 3, 2011. RetrievedSeptember 1, 2011.
  32. ^Markham, Gervase (September 4, 2011)."Updated DigiNotar CN List".Archived from the original on October 21, 2011. RetrievedSeptember 20, 2011.
  33. ^Hypponen, Mikko (August 30, 2011)."DigiNotar Hacked by Black.Spook and Iranian Hackers".Archived from the original on September 25, 2011. RetrievedAugust 31, 2011.
  34. ^"Fraudulent Digital Certificates Could Allow Spoofing".Microsoft Security Advisory (2607712). Microsoft. August 29, 2011. RetrievedAugust 30, 2011.
  35. ^Johnathan Nightingale (August 29, 2011)."Fraudulent *.google.com Certificate".Mozilla Security Blog.Mozilla.Archived from the original on September 21, 2011. RetrievedAugust 30, 2011.
  36. ^"What The DigiNotar Security Breach Means For Qt Users".MeeGo Experts. September 10, 2011. Archived fromthe original on March 24, 2012. RetrievedSeptember 13, 2011.
  37. ^"Opera 11.51 released". Opera Software. August 30, 2011.Archived from the original on October 5, 2011. RetrievedSeptember 1, 2011.
  38. ^Vik, Sigbjørn (August 30, 2011)."When Certificate Authorities are Hacked". Opera Software.Archived from the original on October 8, 2011. RetrievedSeptember 1, 2011.
  39. ^"DigiNotar Second Step: Blacklisting the Root". Opera Software. September 8, 2011.Archived from the original on November 11, 2011. RetrievedSeptember 20, 2011.
  40. ^"About Security Update 2011-005". Apple. September 9, 2011.Archived from the original on September 25, 2011. RetrievedSeptember 9, 2011.
  41. ^"Safari users still susceptible to attacks using fake DigiNotar certs".Ars Technica. September 1, 2011.Archived from the original on October 12, 2011. RetrievedSeptember 1, 2011.
  42. ^"About the security content of iOS 5 Software Update". Apple. October 13, 2011.Archived from the original on February 5, 2009. RetrievedOctober 13, 2014.
  43. ^abJohnathan Nightingale (September 2, 2011)."DigiNotar Removal Follow Up".Mozilla Security Blog.Archived from the original on September 21, 2011. RetrievedSeptember 4, 2011.
  44. ^Schellevis, Joost (August 30, 2011)."Firefox vertrouwt certificaat DigiD niet meer".Tweakers.net (in Dutch).Archived from the original on September 28, 2011. RetrievedAugust 30, 2011.
  45. ^"Frauduleus uitgegeven beveiligingscertificaat". August 30, 2011.Archived from the original on October 6, 2011. RetrievedAugust 31, 2011.
  46. ^Schellevis, Joost (August 31, 2011)."Overheid vertrouwt blunderende ssl-autoriteit".Tweakers.net (in Dutch).Archived from the original on September 28, 2011. RetrievedAugust 31, 2011.
  47. ^Schellevis, Joost (August 31, 2011)."Firefox vertrouwt DigiD toch na verzoek Nederlandse overheid".Tweakers.net (in Dutch).Archived from the original on September 28, 2011. RetrievedAugust 31, 2011.
  48. ^"Bugzilla@Mozilla – Bug 683449 - Remove the exemptions for the Staat der Nederlanden root".Archived from the original on May 2, 2012. RetrievedSeptember 5, 2011.
  49. ^Gervase Markham (September 3, 2011)."DigiNotar Compromise".Archived from the original on September 25, 2011. RetrievedSeptember 3, 2011.
  50. ^"Security of Dutch government websites in jeopardy".Radio Netherlands Worldwide. September 3, 2011. Archived fromthe original on September 27, 2011. RetrievedSeptember 3, 2011.
  51. ^abNewsrelease Dutch Government:Overheid zegt vertrouwen in de certificaten van Diginotar opArchived October 17, 2011, at theWayback Machine, September 3, 2011. Retrieved September 5, 2011.
  52. ^Charette, Robert (2011-09-09)."DigiNotar Certificate Authority Breach Crashes e-Government in the Netherlands - IEEE Spectrum".IEEE.Archived from the original on February 3, 2014. RetrievedJanuary 24, 2014.
  53. ^See certificate onRequest DigiD account[permanent dead link]. Retrieved September 5, 2011.
  54. ^Website Logius:Replacing Certificates. Retrieved September 5, 2011.
  55. ^ab"PKIoverheid SSL". Archived fromthe original on July 12, 2012.
  56. ^abPKIOverheids certificatesArchived October 10, 2011, at theWayback Machine. Retrieved September 5, 2011.
  57. ^abWebsite Dutch office of Quovadis onPKIOverheidArchived October 10, 2011, at theWayback Machine. Retrieved September 5, 2011.
  58. ^Website Getronics onRequesting PKIOverheid certificateArchived October 10, 2011, atarchive.today. Retrieved September 5, 2011.

Further reading

[edit]

External links

[edit]
Hacking in the 2010s
Major incidents
2010
2011
2012
2013
2014
2015
2016
2017
2018
2019
Hacktivism
Groups
Individuals
Majorvulnerabilities
publiclydisclosed
Malware
2010
2011
2012
2013
2014
2015
2016
2017
2018
2019
Retrieved from "https://en.wikipedia.org/w/index.php?title=DigiNotar&oldid=1257502935"
Categories:
Hidden categories:

[8]ページ先頭

©2009-2025 Movatter.jp