27 June 2024
Feisty Duck’s Cryptography & Security Newsletter is a periodic dispatch bringing you commentary and news surrounding cryptography, security, privacy, SSL/TLS, and PKI. It's designed to keep you informed about the latest developments in this space. Enjoyed every month by more than 50,000 subscribers. Written by Ivan Ristić.
Update (28 June 2024): Just a few hours after we published our newsletter, Google announced that they will distrust Entrust from November 2024.
Entrust, one of the oldest Certification Authorities (CAs), is in trouble with Mozilla and other root stores. In the last several years, going back to 2020, there have been multiple persistent technical problems with Entrust’s certificates. That’s not a big deal when it happens once, or even a couple of times, and when it’s handled well. But according to Mozilla and others, it hasn’t been. Over time, frustration grew. Promises were made, then broken. Finally, in May, Mozilla compiled a list of recent issues and asked Entrust to formally respond.
Entrust’s first response did not go down well, lacking sufficient detail. Sensing trouble, it later provided another response, with more information. We haven’t seen a response back from Mozilla yet, just ones from various other unhappy members of the community. It’s clear that Entrust’s case has reached a critical mass of unhappiness.
We haven’t heard from other root stores directly … yet. However, at the recent CA/Browser forum meeting also in May, Google used the opportunity to discuss standards for CA incident response. (The Root Causes podcast has an episode dedicated to it, if you’d like to learn more.) It’s not clear if it’s just a coincidence, but Google’s presentation uses pretty strong words that sound like a serious warning to Entrust and all other CAs to improve—or else.
Looking at the incidents themselves, they’re mostly small technical problems of the kind that could have been avoided with standardized validation of certificates just prior to issuance.
As it happens, Ballot SC-75 focuses on preissuance certificate linting. If this ballot passes, linting will become mandatory as of March 2025. It’s a good first step. Perhaps the CA/Browser Forum will in the future consider encoding the Baseline Requirements into a series of linting rules that can be applied programmatically to always ensure full compliance.
This subscription is just for the newsletter; we won't send you anything else.
In last month’s newsletter, we wrote about how the politicians in the EU are continuing on the path to requiring constant surveillance of all their citizens. We spent the last month reading leaked documentation and contradicting statements from various EU officials. For example, Věra Jourová has said that the EU’s proposal is not breaking encryption or affecting privacy, but she also has been quoted as saying specifically that encryption will be broken.
Ultimately, it seems that the opponents of the proposal produced enough noise, causing the Belgian Presidency to give up on the vote that was supposed to happen on June 20. This is it for now. The presidency will be moving to Hungary, which is expected to continue trying to push the proposal through.
Here are some things that caught our attention since the previous newsletter:
Designed by Ivan Ristić, the author of SSL Labs, Bulletproof TLS and PKI, and Hardenize, our course covers everything you need to know to deploy secure servers and encrypted web applications.
Remote and trainer-led, with small classes and a choice of timezones.
Join over 2,000 students who have benefited from more than a decade of deep TLS and PKI expertise.