Security

Did you know: Lawyers can certify web domain ownership? Well, not no more they ain't

Legal letters, Whois no longer good for obtaining HTTPS certs


Lawyers will no longer be allowed to certify someone's ownership of an internet domain name, and the public Whois no longer represents proof of ownership, when it comes to assigning security certificates to site owners.

That means, for example, you can no longer pay a lawyer $500 to write you a letter asserting you own a particular domain name, and use that to obtain an SSL/TLS cert for it, nor use the Whois database to back up your claims of ownership. These two security loopholes were shut down this week in revised rules for Certificate Authorities (CAs) – the folks that issue, typically via intermediaries, HTTPS certificates for websites.

Internet users are reliant on these digital certificates to encrypt and protect their connections when they visit a HTTPS website, and the site's cert must match its domain name. So if you want a certificate for supercyberbadgers.com, you usually have to demonstrate you own or administrate it before the cert is issued.

Thanks to Google's decision to flag up any site without such a certificate as insecure in its Chrome browser, these certs have become essential. Google's search engine also favors secure sites, and, of course, there are many other benefits to encrypting your site's traffic – and these days free certs are available.

Beware the looming Google Chrome HTTPS certificate apocalypse!

READ MORE

The whole system is under scrutiny. Code-signing certs were found on black markets. Millions of old paid-for Symantec-issued web certificates were killed off after it was discovered the biz has failed to follow CA "baseline requirements" and allowed several organizations to issue their own certificates through its systems without appropriate oversight.

It is those "baseline requirements" that are being revised to remove the Whois and lawyer letters as legitimate forms of authentication for identifying who owns and operates a particular domain name.

In March last year, the joint CA/Browser Forum – which decides on the rules – voted to scrap a vaguely worded part of the rules where a CA could use "any other method of confirmation which has at least the same level of assurance as those methods previously described" and replace it with a list of approved methods.

Whowas

That vote was unanimous. However, a more contentious vote in February this year also scrapped the lawyer and Whois methods of authentication. Previously a lawyer was able to write a letter asserting someone's ownership of a particular domain name, and it could be accepted as proof of ownership. However, the CAs decided this was not a very secure system since lawyers are "generally not qualified to evaluate" domain ownership, according to the man who proposed the motion, Tim Hollebeek of DigiCert.

The Whois method allowed a CA to compare the name and address of the domain owner in the public Whois database to the certificate applicant and approve the application if they matched.

But in another sign that the fiercely protected Whois service isn't worth the paper it isn't written on, the CAs decided this also represented a security risk because people simply make up false Whois details and internet overseer ICANN fails to require a decent level of authentication.

Not everyone was on board with the change however: of the 22 CAs, 14 voted yes – basically all the ones you have heard of – four abstained (Actalis, Disig, HARICA, OATI) and four voted against the change (Buypass, Chunghwa Telecom, Entrust Datacard, SwissSign). All five browser makers voted yes (five? Yes, Comodo apparently has a browser called "Dragon" based on Chromium. Who knew?)

But with 78 per cent of CAs voting yes, it passed, and as of August 1 – yesterday – the new rules came into force. It's not clear that everyone will follow the rules straight away but if a CA is discovered to be using the now-obsolete validation methods, they risk have the certificate revoked – and security researchers will no doubt be looking out for just this sort of behavior.

Walk through

The process has been covered in some detail by Hollebeek in a blog post. It's worth noting that his company, DigiCert, is also the company in charge of cleaning up Symantec's certificate mess – something that he says has been completed.

We spoke to Hollebeek, who views the changes as a critical step in staying ahead of cybercriminals. "There is always a certain amount of angst when there is a ballot to change the baseline requirements," he told us, "but the threat landscape is constantly changing and we have to get better and better."

With that in mind, Hollebeek says he will continue pushing to tighten up the validation rules further to limit the opportunity for dodgy certs. CAs have a set of best practices that a future ballot will propose pulling into the official requirements – such as requiring a CA to ask for an applicant by name. There is also a proposal that would require CAs to say in their certificate which method was used to validate a domain – something that could prove useful in identifying future security gaps.

Hollebeek stresses, however, that no one method of validation is perfect, and that some which are perfectly good in one context may be risky in another – for example an agreed website change that could be carried out by a third party on an e-commerce website, or a user account in an online publishing system.

Other approaches that provide a decent level of security: email from the same domain name; agreed changes to a domain's DNS records; a test certificate; a phone call; an associated IP address; and, of course, DNSSEC and DANE.

In short, while digital certificates are not foolproof, it will be increasingly difficult for scammers and malware folk to get hold of a legit certificate. Combined with browsers' warning against websites without such a certificate, the overall security of the internet should be bumped up a little – which can only be a good thing. ®

Send us news
23 Comments

F5, Cisco admins: Stop what you're doing and check if you need to install these patches

BIG-IP iControl authentication bypass, NFV VM escape, and more

F5 Networks and Cisco this week issued warnings about serious, and in some cases critical, security vulnerabilities in their products.

F5 officials said Thursday its most serious issue, a critical flaw in its iControl REST framework with a severity score of 9.8 out of 10, could be exploited to bypass the authentication software, used by its BIG-IP portfolio, and hijack equipment. Specifically, the vulnerability, tracked as CVE-2022-1388, can be abused by miscreants to, among other things, run malicious commands on BIG-IP devices via their management ports unimpeded.

"This vulnerability may allow an unauthenticated attacker with network access to the BIG-IP system through the management port and/or self IP addresses to execute arbitrary system commands, create or delete files, or disable services," as F5 put it in its advisory. "There is no data plane exposure; this is a control plane issue only."

Continue reading

Shareholders turn the screws on IBM and its gag orders

In wake of dinobaby-gate, investors not happy with NDAs hushing up claims of harassment, discrimination

IBM shareholders at the IT giant's annual meeting last month endorsed a proposal to have the company produce a public report on the potential risks arising from its use of concealment clauses that constrain disclosure of workplace misconduct.

Almost two-thirds (64.7 percent) of participating shareholders voted for the proposal, which was submitted by Clean Yield Asset Management, a US-based investment firm focused on corporate social responsibility.

"The proposal is non-binding so IBM has no obligation to implement the proposal," explained Molly Betournay, director of social research and shareholder advocacy at Clean Yield Asset Management, in an email to The Register. "However, companies tend to address (in one way or another) proposals that garner majority support from shareholders. I expect there will be additional dialogue between IBM and Clean Yield about this issue."

Continue reading

FBI: Cyber-scams cost victims $6.9b-plus worldwide in 2021

Another banner year for criminals. For everyone else, not so much

Cyber-scams cost victims around the globe at least $6.9 billion last year, according to the FBI's latest Internet Crime Report.

Since 2017, the bureau's Internet Crime Complaint Center (IC3) received an average of 552,000 complaints per year. This includes reports of extortion, identity theft, phishing, fraud, and a slew of other nefarious schemes that cost victims no less than $18.7 billion in losses over the five-year period. 

Unsurprisingly, the volume of these crimes — and related costs — have grown every year; 2021 set records [PDF] for the total number of complaints (847,376) as well as losses exceeding $6.9 billion, a jump from the $4.2 billion reported a year earlier.

Continue reading

Twitter buyout: Larry Ellison bursts into Elon's office, slaps $1b down on the desk

With funding from database billionaire, will Oracle-style licensing follow? $50k per like? $1m for 420-character limit?

Elon Musk has bagged $7.14 billion in funding from Oracle billionaire co-founder Larry Ellison, cryptocurrency exchange Binance, and Qatar's sovereign wealth fund, as well as top VC firm Sequioa and others, in his quest to acquire Twitter.

The world's richest man may be worth around $250 billion on paper, but he still needs a little more help from investors to secure enough money to take over the bird-themed microblogging site. The Twitter board last month accepted Musk's offer to take the biz private at $54.20 per share, a $44 billion deal in effect. The SpaceX supremo promised to secure $21 billion himself while the remaining $25.5 billion will be footed by Morgan Stanley, Bank of America, Barclays, and others via debt financing.

Musk sold $8.4 billion of his own Tesla shares last week, causing its share price to temporarily dip by 12 percent. Now, he's cobbled together another $7.1 billion from 18 investors, ranging from VC firms and asset managers to private wealth funds and a cryptocurrency exchange, according to an SEC filing Thursday.

Continue reading

Cable giants, ISPs, telcos end legal fight against California's net neutrality law

If you can't beat the Golden State, try again at the federal level

California Attorney General Rob Bonta on Wednesday welcomed the decision by a group of telecom and cable industry associations to abandon their legal challenge of the US state's net neutrality law SB822.

"My office has fought for years to ensure that internet service providers can't interfere with or limit what Californians do online," said Bonta in a statement. "Now the case is finally over.

"Following multiple defeats in court, internet service providers have abandoned this effort to block enforcement of California's net neutrality law. With this victory, we’ve secured a free and open internet for California's 40 million residents once and for all."

Continue reading

Microsoft, Apple, Google accelerate push to eliminate passwords

Passphrases PIP'd, FIDO and W3C projects promoted

Analysis Microsoft, Apple and Google – all longtime proponents of doing away with passwords for authentication purposes – are throwing their support behind standards developed by the FIDO Alliance and the World Wide Web Consortium (W3C) that could eliminate passphrases completely.

Sometime this year or early in 2023, the three US giants are set to implement these standards so that folks can log into online services and apps using familiar password-less authentication methods, such as the device PIN or fingerprint or face scans they use to unlock their devices, the FIDO – short for Fast Identity Online – Alliance announced Thursday.

It's hoped this will bring about consistent and easy to manage cross-platform authentication for software and websites that doesn't involve recalling passwords.

Continue reading

Did you know Twitter has an open-source arm? This is what it's been up to

Bluesky thinking includes blueprints for distributed social network

After several years of work, Twitter's open-source offshoot Bluesky has published some code and more information about what it's doing – but not a new social network yet.

Just weeks after Elon Musk made moves to buy its parent company, and more than a year after it was discussed before Congress, the Twitter subsidiary has shared some of what it is working on.

In a blog post, Bluesky CEO Jay Graber revealed a little information about what the new company is planning to do, along with some of the members of its team.

Continue reading

SEC adds Tencent, JD.com, China Mobile to group facing potential delisting

US requires a bit more transparency than some Chinese tech companies are giving

More Chinese tech companies including Tencent, JD.com, and China Mobile face delisting by the US Securities and Exchange Commission (SEC) thanks to opaque disclosures.

Tencent-affiliated gaming outfits Huya and Douyu, internet datacenter services provider Vnet Group, and online game services provider NetEase were among more than 80 fresh additions to a provisional list of companies on May 4.

The grouping is presented as part of the Holding Foreign Companies Accountable Act (HFCAA). The act requires some companies that issue securities in the US to allow local auditors to understand how many of its shares are owned by governments, whether governments exercise control over the company, and whether any officials or regulations are connected to the Chinese Communist Party.

Continue reading

Citrix spreads its Desktop as a Service across Google and Azure clouds

It's Q2 2022 – and remote/mixed access is still very much a thing

Citrix has made deals with cloud providers to sell its Desktop as a Service (Daas) platform, providing enterprises with a choice of host for its virtual desktop products.

The latest partnership is with Google Cloud, while a similar arrangement was announced with Microsoft's Azure in April.

The remote access pioneer has made available two new Citrix DaaS products that can be purchased by customers in the Google Cloud Marketplace.

Continue reading

Tablet PC sales decline as consumers consider inflation

Panic buying is over, but the market's still well above pre-pandemic norms

Shipments from nearly all of the major tablet manufacturers are declining as consumers and educators find other things to do with their money.

Distribution data collated by tech analyst Canalys shows 38.59 million units were sent into retail and business channels in calendar Q1, down 3 percent year-on-year, albeit against a tough comparison period when sales in the same period of 2021 went through the roof.

"Despite the shipment decline in Q1, tablet's resurgence remains strong," said Himani Mukka, analyst at the research firm. "The market has now posted eight consecutive quarters of shipment numbers greater than in Q4 2019, before the pandemic."

Continue reading

Microsoft to nudge more users toward Azure Active Directory

Love your Windows Update Compliance reports? Best learn to love Azure AD as well

Users of Microsoft's Update Compliance service have been warned that a move to Azure Active Directory will be required if they wish to continue using the service.

Update Compliance is a tool aimed at helping administrators keep track of security, quality, and feature updates in Windows 10 or 11 (Pro, Education, and Enterprise editions). Powered by the Windows diagnostic data processor, the service spits out a report of device and update issues related to compliance that need attention.

The service is hosted in Azure and is an Azure Marketplace application. It looks at devices on the General Availability Channel as well as the Long-Term Servicing Channel and will need at least Required diagnostic data and ideally Optional (for Windows 11) or Enhanced levels of data for Windows 10 to perform some of the queries of Update Compliance.

Continue reading