Digital certificate authority Trustwave revealed that it has issued a digital certificate that enabled an unnamed private company to spy on SSL-protected connections within its corporate network, an action that prompted the Mozilla community to debate whether the CA's root certificate should be removed from Firefox.
The certificate issued by Trustwave is known as a subordinate root and enabled its owner to sign digital certificates for virtually any domain on the Internet. The certificate was to be used within a private network within a data loss prevention system, Trustwave said.
The CA took steps to ensure that the subordinate root could not be stolen or abused. The certificate was stored in a hardware security module, a device built specifically for the management of digital keys, which ensured that its extraction was impossible, Trustwave said.
The company also performed on-site physical security audits to make sure that the system can't be removed from the premises and used to intercept SSL-encrypted (Secure Sockets Layer-encrypted) traffic on another network.
Mozilla bug tracker
"We did not create a system where the customer could generate ad-hoc SSL certificates and extract the private keys to be used outside this device," said Brian Trzupek, Trustwave's vice president for managed identity and authentication, in a discussion on Mozilla's bug tracker. "Nor could the subordinate root key ever get exported from the device."
Mozilla's community is currently debating whether the issuing of such certificates represents a breach of the software vendor's CA certificate policy, regardless of what security measures were put in place. CAs adhere to this policy in order to have their root certificates trusted by Mozilla's products.
"We reserve the right to not include a particular CA certificate in our software products. This includes (but is not limited to) cases where we believe that including a CA certificate (or setting its "trust bits" in a particular way) would cause undue risks to users' security, for example, with CAs that knowingly issue certificates without the knowledge of the entities whose information is referenced in the certificates," the Mozilla's CA certificate policy states.
Some users are asking Mozilla to remove Trustwave's root certificate from Firefox and Thunderbird because domain name owners were not aware that Trustwave was re-signing certificates in their name through a subordinate root. Mozilla did not immediately return a request for comment.
Trustwave defended itself by saying that the issuing of subordinate roots to private companies, so they can inspect the SSL-encrypted traffic that passes through their networks, is a common practice in the industry. However, the CA decided to stop issuing such certificates in the future and revoke the existent ones.
"I would say that Trustwave should be commended for making this statement public, knowing that this could result in reputational damage," said Calum MacLeod, director for the EMEA region at Venafi, a company that sells certificate and digital key management products. "I believe it is commendable that they will no longer continue this practice, but the reality is in my opinion that this is a common industry practice."
Trustwave might have taken significant steps to ensure that its subordinate root will not be abused, but this is not necessarily true for all cases where companies make use of this technique.
"In the vast majority of enterprises today, there is little or no control over the security and management of private keys," MacLeod said. "In most cases, the private keys are not being protected, and system administrators are handling keys manually."
MacLeod pointed out that just because Trustwave did not issue a subordinate root certificate to a government, an ISP or a law enforcement agency, does not mean that other CAs haven't done so. "Maybe it's time websites carried the same message as the telephone service; 'this session may be recorded!'," he said.
According to Amichai Shulman, chief technology officer and co-founder of security firm Imperva, there are other techniques that companies can use to snoop on SSL-encrypted traffic within their networks, and they don't require the use of such broad certificates.
"The fact that CA services are willing to issue 'weak CA' certificates to practically anyone is outrageous," Shulman said. "Not only that the effect of a compromise of such a certificates is devastating but the chances for it happening are not negligible."