Story image

Mozilla delays distrust of Symantec TLS certificates

15 Oct 2018

Mozilla has delayed its distrust of all Symantec security certificates – because so many businesses have failed to do anything about the problem.

Despite Mozilla’s intention to distrust all TLS certificates issues by Symantec Certification Authority, it seems that more than 1% of the top one million websites are still using Symantec certificates.

Symantec (now part of DigiCert) certificates including GeoTrust, RapidSSL and Thawte are no longer trusted by Firefox.

Since May 2018 (Firefox 60), websites show an untrusted connection error if they have a TLS cert issued before 2016-06-01 that chains up to a Symantec root.

The company has been progressively implemented in Firefox Nightly, which is a pre-release version of the next Firefox browser.

Despite DigiCert’s efforts to make businesses aware of the distrust, it seems some still have not received the message.

DigiCert has even gone as far as providing certificate replacements to affected website owners for no charge.

“Unfortunately, because so many sites have not yet taken action, moving this change from Firefox 63 Nightly into Beta would impact a significant number of our users. It is unfortunate that so many website operators have waited to update their certificates,” says Mozilla’s Wayne Thayer.

He adds that user safety is now at stake due to the delay in rolling out the certificate distrust, but that delay is also in users’ best interests. 

“We continue to strongly encourage website operators to replace Symantec TLS certificates immediately. Doing so improves the security of their websites and allows the tens of thousands of Firefox Nightly users to access them.”

According to Venafi director of enterprise security support Mark Miller, the entire process of distrusting so many certificates can be painful.

“It’s especially painful for organisations that don’t have an automated way to replace their certificates. In fact, many organisations don’t even have a complete inventory of their machine identities.”

“However, by delaying our distrust deadlines we’re leaving the window open for more data to fly out. As security professionals, we need to be able to draw a line and stand behind it with confidence, but to do this organisations will need to prioritise their ability to respond to these kinds of events.”

Mozilla is now delaying the distrust until ‘later this year’ when more sites have replaced their Symantec TLS certificates.

“This change will remain enabled in Nightly, and we plan to enable it in Firefox 64 Beta when it ships in mid-October,” Thayer concludes.
 

SecOps: Clear opportunities for powerful collaboration
If there’s one thing security and IT ops professionals should do this year, the words ‘team up’ should be top priority.
Interview: Culture and cloud - the battle for cybersecurity
ESET CTO Juraj Malcho talks about the importance of culture in a cybersecurity strategy and the challenges and benefits of a world in the cloud.
Enterprise cloud deployments being exploited by cybercriminals
A new report has revealed a concerning number of enterprises still believe security is the responsibility of the cloud service provider.
Ping Identity Platform updated with new CX and IT automation
The new versions improve the user and administrative experience, while also aiming to meet enterprise needs to operate quickly and purposefully.
Venafi and nCipher Security partner on machine identity protection
Cryptographic keys serve as machine identities and are the foundation of enterprise information technology systems.
Machine learning is a tool and the bad guys are using it
KPMG NZ’s CIO and ESET’s CTO spoke at a recent cybersecurity conference about how machine learning and data analytics are not to be feared, but used.
Seagate: Data trends, opportunities, and challenges at the edge
The development of edge technology and the rise of big data have brought many opportunities for data infrastructure companies to the fore.
Popular Android apps track users and violate Google's policies
Google has reportedly taken action against some of the violators.