French intermediate certificate authority issues rogue certs for Google domains
The certificates were used to inspect encrypted traffic on a private network, Google said
IDG News Service - An intermediate certificate authority (CA) registered to the French Ministry of Finance issued rogue certificates for several Google domains without authorization.
Google detected the use of the unauthorized certificates and launched an investigation Dec. 3, Adam Langley, a security engineer at Google, said Saturday in a blog post.
The intermediate CA that issued the rogue certificates linked back to the Agence nationale de la sA(c)curitA(c) des systA"mes d'information (ANSSI), a French national agency that protects government systems against cyberattacks and also operates the French government's public key infrastructure and root certificate authority called IGC/A.
Web browsers use a chain of certificates to determine if a secure website is authentic. Fake SSL (Secure Sockets Layer) certificates are used by hackers, but they also are sometimes used for internal surveillance purposes that do not have nefarious aims, such as the case with the French Ministry.
An intermediate or subordinate CA certificate inherits the authority of the root CA that issued it and can be used to sign certificates for any domain names that would be trusted in all browsers, unless certain technical restrictions are put in place.
According to Langley, Google immediately blocked the misused intermediate CA certificate -- and the certificates it issued -- in Google Chrome and alerted ANSSI and other browser vendors.
The intermediate CA certificate involved in the incident had been issued to the Direction gA(c)nA(c)rale du TrA(c)sor, the Treasury department of the French Ministry of Finance, and its use to sign certificates for domain names that don't belong to the French administration was the result of human error, ANSSI said in a statement on its website.
"The mistake has had no consequences on the overall network security, either for the French administration or the general public," ANSSI said. "The aforementioned branch of the IGC/A has been revoked preventively."
ANSSI found that the intermediate CA certificate had been used in a commercial device to inspect encrypted traffic on a private network with the knowledge of the network's users, Langley said.
ANSSI can confirm the Google statement, spokeswoman ClA(c)mence Picart, said Monday via email. "This use is clearly against the policy of the IGC/A."
The incident follows a similar case late last year when a subordinate CA certificate issued by a Turkish certificate authority called Turktrust to the Municipality of Ankara was installed in a firewall appliance and was used to inspect SSL traffic. In February 2012, Trustwave, another CA trusted by browsers, publicly admitted to issuing a sub-CA certificate to a third-party company so it could inspect SSL traffic passing through its corporate network.
The inspection of SSL traffic on their own networks can help organizations prevent data leaks or discover malicious connections initiated by malware. Many gateway security appliances offer this capability, but the generally accepted method is to use self-generated CA certificates for this purpose. These certificates are not automatically trusted by browsers and need to be deployed by administrators on machines targeted for monitoring.
- Securing Mobility, From Device to Network At one time, the process of managing and securing mobile devices and applications was fairly straightforward. Most organizations worried about one application (email)...
- Data Protection eGuide In this eGuide, CSO and sister publications IDG News Service, Computerworld, and CIO pull together news, trend, and how-to articles about the increasingly...
- Warning: Cloud Data at Risk Experts agree that relying on SaaS vendors to backup and restore your data is dangerous. Yet that's exactly what huge portions of the...
- The Opportunities and Challenges of the Cloud In this report F5 poses questions to IDC analysts, Sally Hudson and Phil Hochmuth, on behalf of F5's customers to better understand the...
- What should I look for in a Next Generation Firewall? SANS Provides Guidance With so many vendors claiming to have a Next Generation Firewall (NGFW), it can be difficult to tell what makes each one different....
- Responding to New SSL Cybersecurity Threat The featured Gartner research examines current strategies to address new SSL cybersecurity threats and vulnerabilities. All Security White Papers | Webcasts
Our new bimonthly Internet of Things newsletter helps you keep pace with the rapidly evolving technologies, trends and developments related to the IoT. Subscribe now and stay up to date!