Verisign Certificate Expiration Causes Multiple Problems 360
We had to do a little sleuthing today. Many readers wrote in with problems that turned out to be related. A certificate which Verisign used for signing SSL certificates has expired. When applications which depend on that certificate try to make an SSL connection, they fail and try to access crl.verisign.com, the certificate revocation list server. This has effectively DOS'ed that site, and Verisign has now updated the DNS record for that address to include several non-routable addresses, reducing the load on their servers. Some applications affected include older Internet Explorer browsers, Java, and Norton Antivirus (which may manifest itself as Microsoft Word being very slow to start). Hope this helps a few people, and if you have other apps with problems, please post about them below.
Now I'm confused. (Score:5, Funny)
(which may manifest itself as Microsoft Word being very slow to start)
But.. I thought this SSL certificate expired just today..
Not the first Verisign CRL certificate problem (Score:5, Interesting)
This vaguely reminds me of the fraudulent Verisign / Microsoft code-signing digital certificates [pkiforum.com] that Verisign issued a few years back.
While not an identical problem, an essential element of why those certificates were potentially harmful was also because of a problem with the CRL checking. Verisign didn't support CRL distribution points [pkiforum.com] in their certificates and you all remember the problems that ensued.
I found security researcher Gene Spafford's comments on the PKI / Verisign [pkiforum.com] issue interesting, which were picked up in Bruce Schneier's Crypto-Gram [schneier.com]. Schneier's comments on the incident [schneier.com] as well as the Microsoft response [microsoft.com] are also worth reading.
It's unbelievable that Verisign which claims to be in the business of Internet security and SSL/TLS digital certificates - the dominant company with 95%+ market share - could let their Root Certificate Authority expire, then force its users to effectively patch their systems by importing the new certificate for the root CA after the fact. That's just bad engineering.
Yes, end-users need to take some responsibility for their systems, but PKI and related technologies are complex and not for novices. It's no better than the keep-your patches-updated-and-use-a-firewall comment that Bill Gates made [slashdot.org] a couple of months ago. That's a bandage, not a solution.
Re:Not the first Verisign CRL certificate problem (Score:3, Informative)
That's not such a big shock... As somebody else pointed out, root certs NEED an expirey date. What throws me is that Verisign seems to be act
Re:Not the first Verisign CRL certificate problem (Score:3, Insightful)
Every other trusted CA certificate, including Verisign's replacement, is going to expire at some point, potentially causing similar problems (most likely not on the same scale though, as Verisign has become the defacto standard root CA).
Certificate expiry is not the issue. As you have correctly stated, every certificate will expire. It's how the expiry is handled that is the issue. In this case it was handled poorly. The average end-user doesn't know anything about online security more than, "Is the l
Re:Not the first Verisign CRL certificate problem (Score:3, Informative)
This is not true, at least for Verisign resellers, like Trustwise in the UK. I renewed two global certs 5 months ago and was not told.
The reason is obvious (Score:5, Funny)
Nice try, guys... now turn the CRL server back on.
Who needs them? (Score:2)
Re:Who needs them? (Score:5, Informative)
Self-signed certificates are fine for Joe-Hobby website, but when you're about to enter a credit card number online it's assuring to see that the SSL cert is signed by a real organization and not "l33t_d00d@hotmail.com"
Re:Who needs them? (Score:5, Insightful)
Re:Who needs them? (Score:5, Insightful)
Re:Who needs them? (Score:2)
It should refuse to install any software, application, webpage, bookmark, address, document, or configuration option.
Re:Who needs them? (Score:2)
No wait! damn, too late...
Re:Who needs them? (Score:5, Funny)
> online it's assuring to see that the SSL cert is
> signed by a real organization...
Unfortunately, we usually have to settle for Verisign instead.
Re:Who needs them? (Score:3, Informative)
I have, and we are now actually a reseller for them (although we only "resell" it to the people we host). ChainedSSL (Equifax in Astroturf) has been working hard to switch us over to their certificates. They're trying to spread a bunch of FUD because the InstantSSL certificates have a root that is owned by Baltimore, which has just been bought out. But InstantSSL has much better browser compatibility (something like 99% of all browsers vs. Equifax's 95%).
They generally have
Verisign isn't the only game in town (Score:5, Informative)
Re:Verisign isn't the only game in town (Score:4, Insightful)
now is it just me or is that a funny statistic?
"...conducting sub $50 transactions (for sites conducting higher value transactions please see InstantSSL Pro or PremiumSSL certificate types)."
I really don't think I should disclose how big my transactions are to this company. It's really none of their business.
What if I'm selling bumper stickers for $5. and some users wants to buy all 12 of the kinds I have? Or is it only per item? If so. I could sell ICs for $1.75 each and just sell them in lots of 50,000 to OEMs.
Re:Verisign isn't the only game in town (Score:4, Informative)
Nope, it's a funny number, but it seems to be some kind if industry norm [whichssl.com].
I really don't think I should disclose how big my transactions are to this company. It's really none of their business.
Actually you don't. What this does is provides a sort of insurance to the consumer. See here [instantssl.com].
It's just peace of mind for the consumer, that says that if I/you rip them off as an InstantSSL customer, InstantSSL will guarantee any fraudulant transaction up to the amount of your cert.
Re:Who needs them? (Score:3, Interesting)
Re:Who needs them? (Score:5, Informative)
Re:Who needs them? (Score:3, Informative)
The one thing I could never stand about Santa Cruz (Score:3, Funny)
Re:Who needs them? (Score:5, Insightful)
It galls me every time I have to give someone on the officially "blessed CA" list money to do something I can do for myself in less time, but I don't know of an alternative that allows the public users of a secure website to not get alarming messages on their browser when they try to give us money.
Re:Who needs them? (Score:5, Insightful)
I just really wish I could find an affordable CA that I felt was trustworthy enough themselves as to feel safe making my customers trust their certificates.
Re:Who needs them? (Score:2, Informative)
Re:Who needs them? (Score:5, Informative)
But they are a lot cheaper for some reason... Go figure...
Re:Who needs them? (Score:3, Insightful)
Re:Who needs them? (Score:2)
Re:Who needs them? (Score:3, Interesting)
You AREN'T going to believe it, but when I lived in the state of Delaware, they actually did this. Granted, they didn't notify me just so they could send me more money. They sent me a letter because one of my pieces of documentation somehow never got to them. When I called to find out exactly what they were missing, they told me that I had also missed one of my deductions t
Re:Who needs them? (Score:2)
Because certs don't have to cost money, and the opensource community would be able to pull this off, wouldn't it?
Re:Who needs them? (Score:2)
The certificates issued by VeriSign are (in principle, assuming you can trust VeriSign, which you can't) based on validated identification using real-world documents. This is done manually, and requires time, hence staff, hence money.
Further, VeriSign has the advantage that their certificates are in Internet Explorer, which is still the dominant browser. In fact *only* VeriSign (and its turncoa
Re:Who needs them? (Score:2)
Damnit, I thought this new-fangled Mozilla stopped all popups?
P.S. That was a joke....
Re:Who needs them? (Score:3, Funny)
Ummm, no it wasn't. You may *think* it was a joke, but trust me it wasn't.
I'm no socialist, but.... (Score:3, Interesting)
Mind you, I'm not calling for government regulation of the Internet... and certai
Re:Who needs them? (Score:5, Informative)
Because a cert signed by you is useful for nothing more than "This conversation is encrypted, and I say I'm me." A cert signed by a Verisign translates to "This conversation is encrypted, and Verisign says I'm me."
What good is that? Well, not much among geeks, we don't trust Verisign further than we can throw them, but we're depending on them to keep this silly DNS thing going. However, web browsers are set with a default list of trusted "Certificate Authorites" who are allowed to sign certificates. Companies who are on those lists can sign a certificate that'll work without errors, anybody else's certificate will prompt a message indicating that the name's right, the time's valid, but the issuing authority isn't on the list of authorities you trust. (You can manually add a new authority if you want... but try convincing users to do that!)
The problem is, so many cheapskates have now signed their own certificate that the bogus authority error isn't stopping users since it's so common when nothing's really wrong. As a result, we're seeing a lot of look alike sites use SSL to get the padlock to come up, and users not being phased by the red-flag alerts that this doesn't seem to be the site they think it is.
Re:Who needs them? (Score:3, Insightful)
Except the Verisign cert actually translates to "This conversation is encrypted, and I paid Verisign a bunch of money so they'd say I'm me." Verisign does fuck all for identity checking. I'm sure they'd gladly issue an SSL certificate to Santos L Halper [snpp.com], as long as he paid them.
The fact is,
Re:Who needs them? (Score:3, Interesting)
If Verisign won't even bother to verify the identity of their own partner in monopoly, do you really trust them to check anyone else's?
Hmmmm... (Score:5, Funny)
A little testy... (Score:5, Funny)
Heh.
Re:A little testy... (Score:5, Funny)
Of course they neglected to include that the notice was on display on the bottom of a locked filing cabinet stuck in a disused lavatory with a sign on the door saying 'Beware of the Leopard.'
If people are getting errors coming to your site.. (Score:5, Informative)
Re:If people are getting errors coming to your sit (Score:2)
Progress (Score:5, Funny)
Re:Progress (Score:2)
They DOSed their own site? Damn, they've made script kiddies obsolete.
Nah, they're just lifting plays from the SCO playbook. They'll be blaming Linux users for the DOS soon.
Duke Nukem (Score:5, Funny)
I can't get the DOS version of Duke Nukem to run in Windows XP. Is this at all somehow related? Is there a fix??
Re:Duke Nukem (Score:2, Informative)
Re:Duke Nukem (Score:2)
Re:Duke Nukem (Forever!) (Score:2, Funny)
*ducks*
Re:Duke Nukem (Score:3, Interesting)
Re:Duke Nukem (Score:2)
Fixed this today... (Score:5, Informative)
Lesson: if the certificate expired yesterday, remove it from IIS and then reboot the thing.
Re:Fixed this today... (Score:5, Funny)
Lesson: if the certificate expired yesterday, remove IIS [apache.org] and then reboot the thing.
HTH. HAND.
Soko
Re:Fixed this today... (Score:5, Funny)
Lesson: If __________________, reboot the thing.
Round Robin? (Score:2)
Re:Round Robin? (Score:2)
Heh. (Score:5, Funny)
In other news, Microsoft, Red Hat, Oracle, Sun, and Apple had to do a little coding today.
Rumors abound that Arnold Schwarzenegger had to do a little governing today, but these allegations remain unconfirmed at this time. More at eleven.
null routing Certificate Revocation List Server. (Score:5, Insightful)
Non-authoritative answer:
Name: crl.verisign.net
Addresses: 10.0.0.1, 10.0.0.2, 10.0.0.3, 64.94.110.11
198.49.161.200, 198.49.161.205, 198.49.161.206
Aliases: crl.verisign.com
Re:null routing Certificate Revocation List Server (Score:4, Funny)
I think it beats another new "helpful" feature like "CRL Finder."
Re:null routing Certificate Revocation List Server (Score:2)
Re:null routing Certificate Revocation List Server (Score:3, Informative)
The default for some web servers is that if the CRL is unavailable, it will reject ALL presented certs.
Re:null routing Certificate Revocation List Server (Score:2)
You still trust VeriSign? Where the hell have you been for the past five years?
Re:null routing Certificate Revocation List Server (Score:3, Informative)
Saw this last night (Score:2, Interesting)
Re:Saw this last night (Score:2, Interesting)
By sheer coincidence, I had called to pay off and close my account (about $3000.)
Windows Explorer (Score:5, Informative)
Unroutable, schmunroutable (Score:5, Interesting)
Re:Windows Explorer (Score:2)
Now let me get this straight, even if you are not using a web browser, or doing anything related to the Internet, this still happens ?
Who in the heck does Microsoft have coding their products ? And what else does Windows XP do without your knowledge ?
Re:Windows Explorer (Score:3, Informative)
Re:Windows Explorer (Score:2)
Fee was too high (Score:5, Funny)
sPh
You mean they didn't... (Score:3, Funny)
VeriSign is lame (Score:5, Insightful)
1) Be trustworthy
2) Be competent
Re:VeriSign is lame (Score:2)
It's a shame they have never been able to do either one of these then isn't it?
Also problems with Oracle (Score:3, Informative)
I can't find ANY info on Oracle's website about this, though. The memo was sent to Oracle Premium Support customers but I don't know if the info has been generally distributed.
Woops!
Re:Also problems with Oracle (Score:3, Informative)
Oracle notified me of this yesterday... (Score:3, Informative)
problems (Score:5, Funny)
Well, now that you mention it, my mother hasn't been able to print for a week, my uncle's PC keeps running checkdisk on startup, and I'm having trouble compiling kernel 2.6.0.
Oh yeah, and Unreal 2k3 has crappy frame rates on the 'Antalus' level, but maybe thats just my old ti4200 card.
Um. I think that's it for now. So when are you going to help me with these?
Re:problems (Score:3, Funny)
2)Remove Windows
3)Post your error messages, and you might get help (but not likely)
4)And last but not least, buy a better video card.
This would be a great opportunity... (Score:2)
Workaround to Explorer problems (Score:5, Informative)
Re:Workaround to Explorer problems (Score:2)
Re:Workaround to Explorer problems (Score:2)
That is pretty retarded.
Re:Workaround to Explorer problems (Score:5, Informative)
So, to clarify, when you try to do a file operation, like copy, Norton intercepts the operation so it can check the file for a virus, then gets itself held up while waiting for IE to tell it if the signature is valid so it can check for that virus. End result is that Explorer never gets an answer from Norton and the operation hangs. Ditto for Word and other applications Norton watches closely.
I too had this same problem on one of two Dell laptops. One used the default McAfee ScanShield that came with it, the other had been reloaded with Norton Anti-Virus. That machine had all sorts of crazy errors, such as Word hanging during opening, hanging when you right-clicked a file, hanging when you tried copying files.
The system also had ooodles of pending updates from Microsoft that had been downloaded but not installed. I'm willing to bet one of them was a root server update or similar. Of course, the problem could be on Norton's end, meaning they need to update the security cert on their server? I'm not sure exactly how it works.
- JoeShmoe
.
Customer Service? (Score:2)
What a crock.
Its happening on most servers. (Score:5, Informative)
Couple of nice links.
http://sunsolve.sun.com/pub-cgi/retrieve.pl?doc
http://www.verisign.com/support/ve
Why should expired cert => CRL traffic spike?? (Score:4, Interesting)
Or is it merely that some software automatically calls the mothership for new information on expiration, and the hostname of the mothership happens to start with "crl"?
(Antidisclaimer: I operate five private CAs and delude myself that I basically understand this stuff.)
Or.... (Score:2, Interesting)
the new Global Server Intermediate Root CA to all GSID customers since
December, 2001, it is possible that some customers may not have noticed the
reminder and are unaware of this issue."
Or like me, it's a case of it was fixed (I know it was because I was the one that did it in early 2002) and now they are trying to figure how (and when) it got broken again....
OMFG (Score:2)
Warning: broken apps you might not think about (Score:5, Insightful)
CA certs in Java (Score:4, Informative)
(find . -name cacerts is your friend), this contains the certificates Java uses when initiating ssl connections.
As of yesterday Sun was still shipping java with the expired 3a certificate.
The way to include the new 3a certificate is to use the keytool command.
The format is somthing like: keytool -v -keystore cacerts -import newcert.pem
The default password for java's cacerts file is "changeit"
VC
ps how many geek points do i get for fixing this last week?
There are alternatives to Verisign... (Score:3, Informative)
beTRUSTed [betrusted.com], which recently purchased [baltimore.com] Baltimore's CyberTrust and OmniRoot businesses. I used Baltimore's certs all the time to avoid VeriSign.
Digital Signature Trust [digsigtrust.com], a subsidiary of Identrus [identrus.com]. I've used their TrustID certs to avoid giving money to VeriSign as well.
Both of the above certificate authorities have their roots in the most current IE and Netscape/Mozilla browsers. Digital Signature Trust does a lot of stuff with banks (being owned by Identrus, which was created by a bunch of banks).
My company was affected... (Score:3, Informative)
The fix was as follows: Open Internet Options, click Advanced tab. Under Security turn off both Check for Server Certificate Revocation and Check for Publisher Certificate Revocation. I think this fix should work for other apps that are affected by the same problem...Thought I'd pass it along.
On a side note, it's pretty scary that this has happened to begin with. What I had to go though was pretty minor since the problem was on one machine, but what about an entire enterprise with an app installed on 1000's of computers that were broken because of this? Because of all this ridiculous "signed app" nonsense, not only are you down, but through proxy Microsoft made you dependant on one of the biggest bastardized companies I know...Verisign. Don't expect this problem to fix itself in a timely manner.
If this is a sign of things to come, Palladium will bring Hell on earth.
Explorer, IE, Excel, Word, IIS - XP, 2K (Score:3, Funny)
Wouldn't have been so bad if it was just my company, but folks from other companies, friends of friends, political buddies of friends of friends...
see also Windows Update (Score:4, Interesting)
- goto http://windowsupdate.microsoft.com/ [microsoft.com]
- click Scan for Updates link (may be prompted to accept the ActiveX thing)
- Navigate to the page of non-critical updates (ironic, no?)
- Find the update named something like "Root Certificate Update" or "Root Certificate Authority" (can't remember which)
- Install it
- rejoice at the ability to use MS Word again
What are you talking about? (Score:5, Funny)
Wait, did I just admit running Windows on slashdot? Bye bye Karma.
Re:Slow Word (Score:2, Informative)
Open Nortons Control Panel - this might take
a few minutes while it is broken but it
will come up eventually. Under the Miscellaneous
Section of Anti Virus, deselect the Enable Office
Plug-in.
That will not fix any general slowness in Norton,
but it will allow you to read your Word/Excel
documents.
Re:Set the clock back (Score:2)
Re:Set the clock back (Score:2)
Re:Uhm... (Score:4, Funny)
With that kind of reaction, I think you've more than proved you've got the mettle to be in management.
Re:Hmm, explains problem with MMORPG (Score:2)
You've misunderstood "certificate" (easy to do). (Score:3, Informative)
You'd think so, wouldn't you? Unfortunately for the sanity of anyone using a certificate architecture, you're wrong.
The certificates issued by Verisign and other Certifying Authorities are more "proof of ID" than anything else; the CA makes no assertions about the trustworthiness of the owner, they just assert that the public encryption key you've just been sent belongs to the same people who own the server you're co