Podcast
Root Causes 456: 2024 Lookback - Bugzilla Bloodbath


Hosted by
Tim Callan
Chief Compliance Officer
Jason Soroko
Fellow
Original broadcast date
January 14, 2025
In this 2024 lookback episode, we give an overview of the firestorm of Bugzilla incidents that we refer to as the Bugzilla Bloodbath. The Bugzilla Bloodbath affected actions around the Entrust distrust, delayed revocation reform, 47-day SSL certificate maximum term, linting, and more.
Podcast Transcript
Lightly edited for flow and brevity.
Capsule summary is that endemic problems and sins that had been committed, that were going on for a long time that I think the CAs, a lot of CAs, had become blasé about came into the spotlight, and as they came into the spotlight, it became really clear that a lot of things were really bad and so we saw just numbers of posted bugs that were off the charts. That were multiples of what we're used to. We saw activity on these posted bugs, just large numbers of posters, huge engagement from the community that were off the charts. That were very different from what we were used to. We saw bugs dragging on for a long, long time because they weren't being successfully resolved, which partly was the community and other people, like browsers, not accepting a kind of hand wavy thing from CAs, and partly it was CAs who weren't fixing their problems and weren't stepping up and weren't providing answers and weren't doing the right thing. All of this led to two distrust incidents.
First one is a company called Ecommerce Monitoring, which is a very small German CA, but the second of which, of course, was Entrust. This was a shocker. If you had said to me on February 1, Entrust will be distrusted this year, I would have said no way. And yet, here we are. And not just, by the way, for TLS. Entrust also had distrust events around S/MIME and VMC and time stamping. That also is very noteworthy, just because of the size and longevity of that particular CA. When these CAs get distrusted, and they're small and they're regional and they're quasi- governmental, and they have less than 1000 active certs, I think it's easy to sort of be dismissive about it in terms of its scope and scale on the web PKI, but when you see a distrust event around a large global, very well- known CA with the large number of large enterprise customers in important industries that affect a large number of people, then that's a big deal.
There have been real things. There's a passed ballot that will go into effect early in 2015 that will require pre-issuance linting. That is a direct consequence of the Bugzilla bloodbath, very directly. So you see this increased scrutiny, and this increased action to force a certain minimum level of quality and competence and compliance out of CAs in recognition of the fact that absent that, you can't count on getting it.
I think there was a point in 2024 - it was a fairly dramatic moment. It's almost like in a western where there's a standoff between the sheriff and the bad guys. The bad guys seem to own the town, but the sheriff is a tough dude. I think what we saw was a question being asked, do the rules matter? And we found out. The rules matter.
Which to put it another way to say, when you scrutinize CAs, I tend to divide it into two broad camps, which is, there is a competency question and there is an integrity question. Are you able to do the right thing? Are you prepared to do the right thing? And in this case, in 2024 while we saw big aspects of both, it was the competency problems that started the conversation, but it was the integrity problems that ended it and that's an important point, which was at the end of the day, a CA that makes well-meaning errors but doesn't continue to make the same well-meaning errors over and over again, and earnestly addresses them and does the hard thing when the hard thing is required, probably does not need to fear distrust. It is the CA that doesn't learn from their mistakes, doesn't earnestly do everything they can to get better and obfuscates or obscures or attempts to dodge responsibility. That is the CA that needs to worry about whether they'll still be in business this time next year.

