Podcast
Root Causes 372: Bugzilla Bloodbath


Hosted by
Tim Callan
Chief Compliance Officer
Jason Soroko
Fellow
Original broadcast date
March 26, 2024
It's a bloodbath on Bugzilla. Since March 9, more than 25 new Bugzilla bugs been written up, which is 10x the typical pace. And it's not over. In this episode we explain what is going on and why.
Podcast Transcript
Lightly edited for flow and brevity.
Now, of course, if a CA didn't self-report, depending on when they got that communication, that might be another failure in the process. But let's deal with that later if that turns out to be the case. So that's about 10 CAs. Each of them writes up an individual bug about what they got wrong. That would be 10 bugs. Right, Jay?
So if an inbound certificate mis-issuance report is filed, and it is filed in the correct way, right, I can't just tie a note to a rock and throw it through your window and claim that I filed an inbound report. But if it's filed and it's filed the correct way, then the CA has a requirement to respond to it very specifically within 24 hours and address what's been said. And most of them, not most of them, many of them didn't do that. Just didn't reply within 24 hours, didn't reply at all, didn't realize they had gotten a note. So there were occurrences like that and those are other another set of bugs. And then if these certs are indeed mis-issued, because the report could be wrong, right, a report could be incorrect and that happens sometimes. But if the certs are indeed mis-issued, then the CAs have an obligation to remediate it. To fix it. And if they fail, in particular, in the process of fixing it, if they fail to revoke the certificates within the required timeframe, that is another failure. That is another non- compliance that is separate from the original issuance problem, and it requires a separate Bugzilla incident.
So we literally have seen CAs write up all three of these and post them all more or less at the same time. We had an issuance problem; we also didn't address the inbound; we also didn't revoke the certificates on time. And bang, bang, bang. So you know, you start to add those up, right? If there are, let's say, 10 CAs that have this problem, there's like 13 problems in addition to that, you know, that's, you know, 230% of the original amount, right? So most of them are having this problem in one form or another and those bugs are showing up as well.
Part number one is the rules are unambiguous. They are unambiguous. The rules are clear. They're clearly written. There's not a lot of room to debate what the rules actually say. And the rules say that if there's a mis-issuance, it's got to be revoked in a certain time period and the time period depends on the nature of the mis-issuance, but it's either 24 hours or five days. And all of that is really easy, like there's not any real wiggle room there. But what we've seen is the CAs have been saying that the revocation would be unduly disruptive to the ecosystem, right? That the consequences of the revocation would be worse than the consequences of the mis-issuance and there is actually a little bit of wiggle room for that. There's some wording that says that if the in the event that the revocation would be unduly harmful to the internet ecosystem, then the CA has the option of not revoking within this timeframe. And so every CA is, not every CA, maybe every CA. Most or all of these CAs are grabbing that. And from what I've seen, every CA that is not revoking on time is going back to that.
So the basic rationale goes, these certificates are doing very important things and if we were to revoke them and the subscribers cannot get them swapped out in time, and if we were to revoke them anyway, then there would be outages that would be very disruptive to various important services that people rely on and therefore, we gave them extra time. And some of them gave them a couple extra time. Some of them have gone into their bugs and saying they're giving them like, an extra month, like a huge, or two months, like just huge amounts of time. And, so that, of course gets into some real, I would say difficult and tricky conversations. Like if any subscriber can just have as much time as they as they want because they can't swap the certs out then why do we have a mandatory revocation at all? Right? What good is it doing?
And you know, I said this in the earlier episode that you talked about, which is these rules are incredibly byzantine, and they change and CAs have issuance errors. It's part of our world and if you were outside this world, you'd say, oh, well, how's that possible, just follow the rules. But it is possible. It does happen and it happens to every CA. That is not the failure. But the failure to revoke, the failure to remediate, those are failures, right.
There also have been debates about ceasing issuance of certs. And that's another area where, you know, CAs have action they can take, and they don't all take it. And so, that becomes a lot of the debate, which is, look, you have been entrusted with the public trust model, right, with the wheel of the web PKI and you are not doing the things that you signed up to do. Right?
I used this analogy with someone not too long ago, which is, if you go to work for the fire department a lot of the time if you're a firefighter, right, a lot of the time seems like it's a good life, right? You hang around the fire station and polish the brass and, you know, do pushups and cook big spaghetti meals. But every once in a while, you have to run into a burning building. Now, if you decide you're not willing to run into the burning building, then you don't get to have the rest of that stuff. Right? And CAs who don't do their revocation are like firemen who decide not to run into the burning building. And I think this is a problem. Because if you're going to be a public CA, and you're going to be entrusted with all of this, and you're going to sell your certificates and all this stuff you're gonna do, then somewhere along the line, when the time comes, and you have to do a forced revocation, you have to do it. And that is not the time for people whose stomachs are too weak to disappoint their paying customers. And that is something that we've definitely identified as a real problem in the current CA community.

