French government sub-CA issues unauthorized certificates for Google domains

The certificates were used to inspect encrypted traffic on a private network, Google said

An intermediate certificate authority (CA) registered to the French Ministry of Finance issued rogue certificates for several Google domains without authorization.

Google detected the use of the unauthorized certificates and launched an investigation Dec. 3, Adam Langley, a security engineer at Google, said Saturday in a blog post.

The intermediate CA that issued the rogue certificates linked back to the Agence nationale de la sécurité des systèmes d'information (ANSSI), a French national agency that protects government systems against cyberattacks and also operates the French government's public key infrastructure and root certificate authority called IGC/A.

Web browsers use a chain of certificates to determine if a secure website is authentic. Fake SSL (Secure Sockets Layer) certificates are used by hackers, but they also are sometimes used for internal surveillance purposes that do not have nefarious aims, such as the case with the French Ministry.

An intermediate or subordinate CA certificate inherits the authority of the root CA that issued it and can be used to sign certificates for any domain names that would be trusted in all browsers, unless certain technical restrictions are put in place.

According to Langley, Google immediately blocked the misused intermediate CA certificate -- and the certificates it issued -- in Google Chrome and alerted ANSSI and other browser vendors.

The intermediate CA certificate involved in the incident had been issued to the Direction générale du Trésor, the Treasury department of the French Ministry of Finance, and its use to sign certificates for domain names that don't belong to the French administration was the result of human error, ANSSI said in a statement on its website.

"The mistake has had no consequences on the overall network security, either for the French administration or the general public," ANSSI said. "The aforementioned branch of the IGC/A has been revoked preventively."

ANSSI found that the intermediate CA certificate had been used in a commercial device to inspect encrypted traffic on a private network with the knowledge of the network's users, Langley said.

ANSSI can confirm the Google statement, spokeswoman Clémence Picart, said Monday via email. "This use is clearly against the policy of the IGC/A."

The incident follows a similar case late last year when a subordinate CA certificate issued by a Turkish certificate authority called Turktrust to the Municipality of Ankara was installed in a firewall appliance and was used to inspect SSL traffic. In February 2012, Trustwave, another CA trusted by browsers, publicly admitted to issuing a sub-CA certificate to a third-party company so it could inspect SSL traffic passing through its corporate network.

The inspection of SSL traffic on their own networks can help organizations prevent data leaks or discover malicious connections initiated by malware. Many gateway security appliances offer this capability, but the generally accepted method is to use self-generated CA certificates for this purpose. These certificates are not automatically trusted by browsers and need to be deployed by administrators on machines targeted for monitoring.

The use of sub-CA certificates issued by trusted CAs for SSL traffic inspection is considered dangerous because if such a certificate gets stolen it can be used in man-in-the-middle (MITM) attacks to intercept traffic outside of private networks on the Internet.

In 2012, Mozilla said that issuing sub-CA certificates to third parties for traffic inspection is unacceptable and asked CAs to revoke certificates issued for this purpose. In February 2013, the software developer updated its CA Certificate Policy to improve the accountability for the intermediate CA certificates.

The policy change requires CAs to implement technical constraints for sub-CA certificates issued after May 15, 2013, or to publicly disclose such certificates and subject them to the same audits as their root CA certificates. The technical constraints the policy refers to include the name constraints extension that can be used to restrict a sub-CA certificate's usage to a particular domain name.

CAs received a grace period until May 15, 2014, to update their sub-CA certificates issued before May 15, 2013.

"The intermediate CA was not yet constrained, but there is a plan to implement such limitations," Picart said. "We are currently under the process to review all the intermediate CA issued by IGC/A in order to make sure this incident cannot happen again."

It's not clear whether the misused intermediate CA certificate was issued before or after May 15, 2013, and ANSSI did not share this information. The date could indicate whether the agency violated Mozilla's new policy or not.

"I think that's what everyone is now waiting to see," Ivan Ristic, director of application security research at security firm Qualys, which runs the SSL Labs and SSL Pulse projects, said via email. Assuming the certificate was only used internally, no one externally could have seen it, he said.

Mozilla did not immediate respond to a request for comment.

Ristic believes that preventing sub-CA certificate abuse going forward will require a combination of technical and policy-based measures.

"First, we need to get Public Key Pinning widely supported and have the violations reported," he said. "That, in combination, with clear rules that the use of public CAs is not allowed for MITM, will hopefully do it."

Public key pinning is a browser feature that caches information about legitimate SSL certificates used on visited websites, so that if traffic interception is attempted in the future using rogue certificates, the browser would be able to detect and block those attempts. A version of this feature is already implemented for some high-profile websites in Google Chrome, but is being considered as an Internet standard.

Policy-based restrictions need to be backed by enforcement, Ristic said. They won't work unless browser and operating system developers are prepared to temporarily or permanently revoke their trust in root CA certificates for violations, he said.

Join the CSO newsletter!

Error: Please check your email address.

Tags online safetyGooglesecurityencryptiondata protectionqualysmozillapki

More about GoogleMozillaQualysTrustwave

Show Comments

Featured Whitepapers

Editor's Recommendations

Solution Centres

Stories by Lucian Constantin

Latest Videos

  • 150x50

    CSO Webinar: The Human Factor - Your people are your biggest security weakness

    ​Speakers: David Lacey, Researcher and former CISO Royal Mail David Turner - Global Risk Management Expert Mark Guntrip - Group Manager, Email Protection, Proofpoint

    Play Video

  • 150x50

    CSO Webinar: Current ransomware defences are failing – but machine learning can drive a more proactive solution

    Speakers • Ty Miller, Director, Threat Intelligence • Mark Gregory, Leader, Network Engineering Research Group, RMIT • Jeff Lanza, Retired FBI Agent (USA) • Andy Solterbeck, VP Asia Pacific, Cylance • David Braue, CSO MC/Moderator What to expect: ​Hear from industry experts on the local and global ransomware threat landscape. Explore a new approach to dealing with ransomware using machine-learning techniques and by thinking about the problem in a fundamentally different way. Apply techniques for gathering insight into ransomware behaviour and find out what elements must go into a truly effective ransomware defence. Get a first-hand look at how ransomware actually works in practice, and how machine-learning techniques can pick up on its activities long before your employees do.

    Play Video

  • 150x50

    CSO Webinar: Get real about metadata to avoid a false sense of security

    Speakers: • Anthony Caruana – CSO MC and moderator • Ian Farquhar, Worldwide Virtual Security Team Lead, Gigamon • John Lindsay, Former CTO, iiNet • Skeeve Stevens, Futurist, Future Sumo • David Vaile - Vice chair of APF, Co-Convenor of the Cyberspace Law And Policy Community, UNSW Law Faculty This webinar covers: - A 101 on metadata - what it is and how to use it - Insight into a typical attack, what happens and what we would find when looking into the metadata - How to collect metadata, use this to detect attacks and get greater insight into how you can use this to protect your organisation - Learn how much raw data and metadata to retain and how long for - Get a reality check on how you're using your metadata and if this is enough to secure your organisation

    Play Video

  • 150x50

    CSO Webinar: How banking trojans work and how you can stop them

    CSO Webinar: How banking trojans work and how you can stop them Featuring: • John Baird, Director of Global Technology Production, Deutsche Bank • Samantha Macleod, GM Cyber Security, ME Bank • Sherrod DeGrippo, Director of Emerging Threats, Proofpoint (USA)

    Play Video

  • 150x50

    IDG Live Webinar:The right collaboration strategy will help your business take flight

    Speakers - Mike Harris, Engineering Services Manager, Jetstar - Christopher Johnson, IT Director APAC, 20th Century Fox - Brent Maxwell, Director of Information Systems, THE ICONIC - IDG MC/Moderator Anthony Caruana

    Play Video

More videos

Blog Posts