Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!

 



Forgot your password?
typodupeerror
Encryption Security Chrome

HTTPS Certificate Industry Adopts New Security Requirements (googleblog.com) 27

The Certification Authority/Browser Forum "is a cross-industry group that works together to develop minimum requirements for TLS certificates," writes Google's Security blog. And earlier this month two proposals from Google's forward-looking roadmap "became required practices in the CA/Browser Forum Baseline Requirements," improving the security and agility of TLS connections... Multi-Perspective Issuance Corroboration
Before issuing a certificate to a website, a Certification Authority (CA) must verify the requestor legitimately controls the domain whose name will be represented in the certificate. This process is referred to as "domain control validation" and there are several well-defined methods that can be used. For example, a CA can specify a random value to be placed on a website, and then perform a check to verify the value's presence has been published by the certificate requestor.

Despite the existing domain control validation requirements defined by the CA/Browser Forum, peer-reviewed research authored by the Center for Information Technology Policy of Princeton University and others highlighted the risk of Border Gateway Protocol (BGP) attacks and prefix-hijacking resulting in fraudulently issued certificates. This risk was not merely theoretical, as it was demonstrated that attackers successfully exploited this vulnerability on numerous occasions, with just one of these attacks resulting in approximately $2 million dollars of direct losses.

The Chrome Root Program led a work team of ecosystem participants, which culminated in a CA/Browser Forum Ballot to require adoption of MPIC via Ballot SC-067. The ballot received unanimous support from organizations who participated in voting. Beginning March 15, 2025, CAs issuing publicly-trusted certificates must now rely on MPIC as part of their certificate issuance process. Some of these CAs are relying on the Open MPIC Project to ensure their implementations are robust and consistent with ecosystem expectations...

Linting
Linting refers to the automated process of analyzing X.509 certificates to detect and prevent errors, inconsistencies, and non-compliance with requirements and industry standards. Linting ensures certificates are well-formatted and include the necessary data for their intended use, such as website authentication. Linting can expose the use of weak or obsolete cryptographic algorithms and other known insecure practices, improving overall security... The ballot received unanimous support from organizations who participated in voting. Beginning March 15, 2025, CAs issuing publicly-trusted certificates must now rely on linting as part of their certificate issuance process.

Linting also improves interoperability, according to the blog post, and helps reduce the risk of non-compliance with standards that can result in certificates being "mis-issued".

And coming up, weak domain control validation methods (currently permitted by the CA/Browser Forum TLS Baseline Requirements) will be prohibited beginning July 15, 2025.

"Looking forward, we're excited to explore a reimagined Web PKI and Chrome Root Program with even stronger security assurances for the web as we navigate the transition to post-quantum cryptography."

HTTPS Certificate Industry Adopts New Security Requirements

Comments Filter:
  • So what fresh new hell have they cooked up for my domain certs now?
    • I think you mean: what are they forcing us to do so they can push Chrome even more that has this feature already build in?
    • >"So what fresh new hell have they cooked up for my domain certs now?"

      My thought, exactly. It is already a big mess. And something tells me that these measures will somehow favor Google platforms, browsers, procedures, and power.

      I am also wondering how this affects Let'sEncrypt.

      • I feel like the majority use HTTP-01 challenge because it's so easy. DNS-01 challenge requires a agent that is compatible in your infrastructure AND your DNS provider that narrows the field considerably, I already know of one in my infrastructure that isn't compatible. Google seems named here but I have to wonder how much Cloudflare pushed this one too...
        • One thing that really helps with DNS challenges is ACME DNS (https://github.com/joohoi/acme-dns)

          I won't say it's perfect, among other issues:

          - It becomes an issue if two sites need similar certificates
          - You need to run a DNS server especially for it. If you only have a limited number of IPs that can be a PITA (but see dnsdist, which proxies DNS requests. No, the obvious solution - asking BIND to forward requests - is not possible due to the weird rules that govern DNS and what's allowed to produce an "autho

        • I feel like the majority use HTTP-01 challenge because it's so easy.

          Bold of you to assume the certs are going to nginx or apache servers or something else that will serve up an HTTP request like that. Now, to be fair, you may be right that 51% of them are, but the majority of the certs I implement aren't.

          Many go to firewalls; Fortigate, Sonicwall, and Sophos all have HTTP frontends to their VPN services; it's not like I can just throw a text file into the server's /var/www folder. Others go to reverse proxies, that don't themselves host the file in question. I've been able

        • HTTP challenge does not work with non-publicly accessible sites though. ACME-DNS works great up to the point that sub-domains need different security measures.

    • by psmears ( 629712 )

      So what fresh new hell have they cooked up for my domain certs now?

      ... that they will no longer issue certificates for your domain to someone else? Sounds like a good thing, on the whole!

      • by dgatwood ( 11270 )

        So what fresh new hell have they cooked up for my domain certs now?

        ... that they will no longer issue certificates for your domain to someone else? Sounds like a good thing, on the whole!

        The thing is, they could shut down and guarantee that with 100% certainty. Making it harder for someone else to get certs for your domain is nice until it prevents you from getting certs for your own domain. Also, it does nothing for the gaping hole that lookalike domains represent.

        As far as I am concerned, TLS certificates stopped being beneficial when they stopped costing thousands of dollars. Expanding TLS to every random person who wants to run a web server destroyed their value in recognizing a site

    • It's OK, you have plenty of time to migrate all your automated DNS scripts and tools, and buy new hardware and upgrade to new operating systems if needed, and rewrite your entire stack that was assuming the status quo, as it doesn't take affect until March 15th 2025, and 2025 is next year right? Yep, definitely next year, this check I just wrote says 2024...

    • by Junta ( 36770 )

      Looks straightforward enough.

      For the first, nothing on the requester's end to change, they just have to probe the infrastructure from multiple, disparate places to mitigate risk that their interrogating system is screwed with.

      For the second, a linting that could be an issue, but shouldn't be an issue unless you have a mistake in your CSR that you shouldn't want out there anyway.

    • Re:Oye Vey (Score:5, Informative)

      by karmawarrior ( 311177 ) on Monday March 31, 2025 @10:01AM (#65271461) Journal

      After reviewing it, it doesn't look as if the proposal will break anything.

      https://www.ssl.com/blogs/mult... [ssl.com]

      Basically the proposal is that for HTTP challenges of the sort Lets Encrypt does, when the registrar is checking, it needs to check multiple times in multiple parts of the world. This minimizes the chance of someone intercepting the IP packets or redirecting them and getting a certificate under false pretenses.

      Unless you're using some weird challenge script that somehow detects when the authentication token has been fetched and immediately removes it without waiting for the registrar to give the all clear, there should be no changes needed for the person trying to get the certificate.

      So, for once, this is a proposal to secure SSL certificates that doesn't cause hell for sysadmins. I'm sure they're thinking of ways to torture us anyway though, probably with one hour expirations coming next...

    • by hwstar ( 35834 )

      More work for the certificate re-issuer due to administrative overhead will result in increased costs for certificate renewal. Also, the free certificates you get from Let's Encrypt et. al. may become rarer.

  • This is an announcement for... Certificate Authorities and all the 400 people in the world who do that job. It's almost completely irrelevant to the other 8 billion or so people.
  • by ewhac ( 5844 ) on Monday March 31, 2025 @05:08AM (#65271089) Homepage Journal
    Would it have killed ya to put in a link describing what MPIC is? [ssl.com]
  • Letsencrypt does that already and is free.
  • by Old Man Kensey ( 5209 ) on Monday March 31, 2025 @06:29AM (#65271133) Homepage
    The problem is that we all just go along with the idea that a couple of hundred "authorities" chosen by a small cadre of mostly profit-seeking entities are ultimately-trusted by default to issue any certificate for any domain. There are already methods like DANE for authenticating a cryptographic key as belonging to an identified domain registrant that make CAs basically unnecessary in the vast majority of cases -- but your browser doesn't support them because it's overwhelmingly likely that your browser is Chrome, and Chrome doesn't (and won't, judging by history) support anything but the status quo on this, so there's little incentive for other browser makers to do so either.
    • I looked up DANE. It moves the goal post to DNS, and employs DNSSEC.

      There is a subtle but significant difference between trusting a domain name provider pointing me a correct IP, versus trusting a domain name provider to also safeguard if the content transmitted is not intercepted. The root DNS system is a lot more centralized. Over-centralization can lead to abuses too.

      Both Chrome and Firefox has gone the route of DNS-over-HTTPS for DNS security.

      • It doesn't have to be perfect, just better than what this is, and it is. I put my TLS certificate in my DNS zone with a TLSA record, then sign my zone with my known, published DNSSEC key. Only I can sign my zone with that key and the chain of trust extends from the root of the DNS down to my signed records -- just like the current highly-centralized CA system, except history suggests publishing a malicious DNSSEC key for my domain is a lot harder than getting one of a couple of hundred CAs of varying trus
  • I suspect that actually having a mechanism to do this(much less avoiding having that mechanism succumb to the obvious adversarial move of an ISP or similar declaring all domains as 'internal' when resolving them for users) would be deeply nontrivial; but it would be really nice if there were some way to cleanly distinguish between 'internal' and 'public' use cases for SSL certs.

    Unless you are talking a toy-scale situation of telling a handful of admin endpoints about the thumbprints of a dozen self-signe
    • We need a middle ground between "trusting" each and every self-signed certs and "trusting" a custom CA to authenticate websites arbitrarily.

      Fact: we get a lot of intranet web UIs that shouldn't (need to) request public cert from authorities outside the intranet.

      Not sure how to best achieve that though.

  • How exactly is it relevant to this issue? Why not mention blockchain and AI, while we're at it?

    • by ledow ( 319597 )

      PQC is already in your browser, part of HTTPS negotiations and they are migrating away older ciphers towards PQC ciphers all the time.

      I'm literally using X25519MLKEM768 to negotiate keys to talk to this server at Slashdot right now, as well as Elliptic Curves.

      The primary encryption is still an AES variant (AES_128_GCM) but there's no need for it to be so... however AES is still proving QC-safe.

      It would be absolutely remiss of such an organisation to NOT consider PQC in their designs, implementations, deploy

Any sufficiently advanced technology is indistinguishable from magic. -- Arthur C. Clarke

Working...