Podcast
Root Causes 99: AddTrust Root Expiration Explained


Hosted by
Tim Callan
Chief Compliance Officer
Jason Soroko
Fellow
Original broadcast date
June 12, 2020
The recent expiration of Sectigo's AddTrust legacy root caused some systems to stop working and forced some admins to keep working over the weekend until all was fixed. In this episode we explain roots, root expirations, why they are a non event for most users, and why sometimes an expiration can be more impactful.
Podcast Transcript
Lightly edited for flow and brevity.
So, the way we solve that in the long term is that all got solved with auto update. Right? Once we got to the point where systems were routinely auto-updating, we could auto-update roots. So, if you have a Windows or a Mack desktop or you have an iOS or an Android phone or Windows phone, those are getting auto updates on a routine basis. And part of what they are getting is they are getting new roots. Right? So, if I want to create, if I want to become a CA today and I want to join the Firefox root program, the Mozilla root program, I go, I meet Mozilla’s requirements. Mozilla says you met my requirements, they add the root to the root program and then when the Firefox auto update rolls around those Firefox installations that are already out in the world get the new root. So, I get backward compatibility on those roots. So, you understand where that’s a flexible, agile robust system. But the problem is, what about old systems? What about systems that were in use before we had auto updates. Right? So, once upon a time, I didn’t have this stuff and the auto update came in in the late 2000s and in that kind of timeframe I could start to rely on this. But there are systems around from before that where they just won’t connect and the response to that is legacy root programs.
So, a public CA like Sectigo can take one of these old roots that got embedded into these systems a long time and they can basically cross-certify to it. So, what happens is the cert on the machine tries to go up and follow the modern root up to the trust level. But if that root isn’t available, let’s say because it’s an older machine, if the certificate itself is cross-certified to a different root, an older root that may be on that machine, what we call a legacy root, then it will follow that chain up and it will cross-certify to that as well.
So, it’s common practice to support older systems, it’s common practice for public CAs to cross-certify to roots that span back to before there was auto update. And all else being equal, the further back the better. Right? Because there are more people who can connect fewer people who are locked out. And so, Sectigo had one of these roots. It was called AddTrust. It was established in the year 2000 with a 20-year lifespan and that certificate was there as a fallback and alternate. Sorry, that root was there as a fallback and alternate to help older legacy systems that didn’t have our modern Comodo root help them still establish trust and that certificate expired on May 30, 2020.
So that’s what went on and, you know, a bunch of people showed up on social media saying I have a problem. My things not working. I don’t know why. And other people chimed in and said, you know, I think it’s this root rollover or this root expiration and sometimes it was and sometimes it wasn’t and there were people who wrote blogs about it and there were a few articles at appeared. So, you and I just thought it would be a good idea to kind of lay it all out, what happened, why it happened. Why roots have to expire. Right? And so, you know, that’s basically what went on. This legacy root expired, and I think there was a - - the number of systems that were affected was greater than expected and part of that was these unknown softwares. Right? That was part of it. So, systems that themselves should have been fine, that everybody expected to be fine, had always been fine, suddenly weren’t fine. Part of it was the extreme interconnectedness of things and part of it was just the very large numbers that we are dealing with.
So, you know, some people had a very bad weekend. Right? And some people got called in and they had systems that were down, and they were working on fixing those systems and a lot of them didn’t understand, I think, that they had this dependency. That they had these legacy systems and one of the things that also comes out of this is, you know, oftentimes, the systems that depend on the legacy roots, those are the oldest ones. Those are the first ones. And as such, they tend to be at the center of everything. You know, if there is the foundational database that everything was build on, guess what? That’s the old stuff. And so, when things went down there was a tendency for them to be services that other services had been built on and ultimately depended on and that also made it worse for the people who were having an issue and it made it worse for them to determine their crypto readiness anyway. Right? Because when you get into these old, old legacy systems - - think about a system you are still running in the enterprise that’s 15 years old. You know? What would be some of the qualities of that system, Jay?
So, you must have a system that can account for that reality and that’s about automation, visibility and governing its policies.

