GlobalSign screw-up cancels top websites' HTTPS certificates

Revoked certs may linger for days, locking people out of sites


Final update GlobalSign's efforts as a root certificate authority have gone TITSUP this afternoon – that's a total inability to support usual protocols.

The result is that many websites big and small have had their HTTPS certificates incorrectly scrapped, meaning that for some people their browsers no longer trust websites and refuse or are reluctant to access them.

Specifically, it appears GlobalSign inadvertently triggered the revocation of its intermediary certificates while updating a special cross-certificate. This smashed the chain of trust and ultimately nullified SSL/TLS certificates issued by GlobalSign to its customers. It could take days to fix, leaving folks unable to easily read their favorite webpages.

GlobalSign estimates it could take until the beginning of next week for websites' accidentally axed certs to be corrected. The organization has set up a support page for IT administrators and folks looking to fix broken HTTPS certificates.

GlobalSign said the worldwide mass revocation was an "unexpected consequence" of internal changes it made, and claimed browsers and other software "incorrectly inferred" that certificates had been burned. (It later admitted its own systems were at fault.)

If you're not affected by today's outage – consider yourself lucky as the problem won't hit everyone due to the wide range of caching and revocation policies employed by different browsers, apps and other software. If your application hasn't picked up the revocations yet, it should be fine – if it has, you can try to delete your certificate revocation list cache (see the above link for instructions on Windows and macOS) to see if that helps.

"That's the unfortunate thing about PKI, different browsers have different update levels," GlobalSign's strategic projects director Steve Roylance told The Reg.

Wikipedia blocked in Google Chrome after its HTTPS cert was accidentally revoked (click to enlarge)

Just hours ago, it became clear that GlobalSign – a New Hampshire, US-based biz – was having troubles with its Online Certificate Status Protocol (OCSP), which is used for obtaining the revocation status of public key certificates which ensure that netizens are connecting to legit sites using SSL/TLS.

"We are currently experiencing a known issue which is causing certificate revocation/error messages to be displayed within some of our certificates," a rep for GlobalSign tweeted earlier.

Responding to complaints on Twitter, GlobalSign said it had sorted out the issue on its end, but stressed it'll take time for the changes to work their way through the internet's maze of caches. The web company's status page states:

We are currently experiencing a known issue which is causing certificate revocation/error messages to be displayed within some of our certificates.

Unfortunately, the cache laundering is a tricky process that not everyone can follow, meaning less technology-literate peeps may struggle with certificate errors for some time.

As of publication, people are up in arms about how long it's going to take to correct the dodgy revocations.

Sites affected include the Financial Times, Guardian, Wikipedia, Logmein, and Dropbox.

This afternoon, a spokeswoman for GlobalSign shed some more light on the outage:

GlobalSign manages several root certificates and for compatibility and browser ubiquity reasons provides several cross-certificates between those roots to maximize the effectiveness across a variety of platforms.

As part of a planned exercise to remove some of those links, a cross-certificate linking two roots together was revoked. CRL responses had been operational for one week, however an unexpected consequence of providing OCSP responses became apparent this morning, in that some browsers incorrectly inferred that the cross-signed root had revoked intermediates, which was not the case.

GlobalSign has since removed the cross-certificate from the OCSP database and cleared all caches. However, the global nature of CDNs and effectiveness of caching continued to push some of those responses out as far as end users. End users cannot always easily clear their caches either through lack of knowledge or lack of permission. New users (visitors) are not affected as they will now receive good responses. The problem will correct itself in four days as the cached responses expire, which we know is not ideal. However, in the meantime, GlobalSign will be providing an alternative issuing CA for customers to use instead, issued by a different root which was not affected by the cross that was revoked but offering the same ubiquity.

Meanwhile, this is what GlobalSign's telling its customers... ®

This breaking story was updated after publication to include comments and explanations from GlobalSign.

Similar topics

Narrower topics


Other stories you might like

  • Apple dev logs suggest 'nine new M2-powered Macs'
    'Widespread internal testing' of four processor types

    Apple is seemingly testing four next-generation M2 processors on software developed by third-party app makers in at least nine Mac models that are likely to be upcoming laptops and desktops.

    Two years ago, the iGiant debuted its homegrown Arm-compatible M1 processor to power computers and iPads; the shift marked a departure from using x86 Intel silicon for its PCs. Instead of purchasing off-the-shelf processors, Apple – which was already designing its own mobile system-on-chips – wanted a custom design for its macOS products.

    Now it appears the M1's successor, the M2, is edging closer to launch, judging from developer logs leaked to Bloomberg that signal there is "widespread internal testing" of the chip family at Apple.

    Continue reading
  • Twitter preps poison pill to preclude Elon Musk's purchase plan
    Populist provocateur ponders partners to pay for platform prize

    Comment Twitter on Friday said its board of directors had unanimously approved a plan to prevent a hostile takeover, something that became a distinct possibility after billionaire Elon Musk offered $43 billion to buy the social media network.

    The poison pill, or "Rights Plan," the biz said, "will reduce the likelihood that any entity, person or group gains control of Twitter through open market accumulation without paying all shareholders an appropriate control premium or without providing the Board sufficient time to make informed judgments and take actions that are in the best interests of shareholders."

    The "Rights Plan" would require Musk to negotiate directly with the board to increase his share of the company beyond 15 percent. After that every existing shareholder, with the exception of Musk, would be able to buy Twitter stock at a discounted rate.

    Continue reading
  • Feds offer $5m reward for info on North Korean cyber crooks
    Meanwhile: Caltech grad earns five years in prison for heping Kim's coders

    The US government offered a reward up to $5 million for information that helps disrupt North Korea's cryptocurrency theft, cyber-espionage, and other illicit state-backed activities.

    The cash will be awarded "for information that leads to the disruption of financial mechanisms of persons engaged in certain activities that support North Korea, including money laundering, exportation of luxury goods to North Korea, specified cyber-activity and actions that support WMD proliferation," according to the Feds.

    This includes "information on those who seek to undermine cybersecurity, including financial institutions and cryptocurrency exchanges around the world, for the benefit of the Government of North Korea."

    Continue reading

Biting the hand that feeds IT © 1998–2022