(Possible) Diginotar Hacker Comes Forward 215
arglebargle_xiv writes "At the risk of burning people out on the topic of PKI fail, someone claiming to be the Diginotar hacker has come forward to claim responsibility: It's the ComodoGate hacker. He also claims to 0wn four more 'high-profile' CAs, and still has the ability to issue new rogue certificates, presumably from other CAs that he 0wns." Whether this claim turns out to be truthful or not, what led to the breach in the first place? Reader Dr La points to an interim report commissioned by the Dutch government (PDF), according to which
"a) No antivirus software was present on Diginotar's servers; b) 'the most critical servers' had malicious software infections; c) The software installed on the public web servers was outdated and not patched; and d) all servers were accessible by one user/password combination, which was 'not very strong and could easily be brute-forced.'"
Re:Honest question: (Score:4, Interesting)
And Mozilla gave these jokers a pass while raking CACert across the coals [mozilla.org].
That distinction is very instructive as to the real motivations of the PKI industry.
The difference between CACert and DigiNotar (Score:4, Interesting)
I love this comment from Mozilla's Nelson Bolyard in that thread: