DigiCert: Threat of legal action to stifle Bugzilla discourse
Background: Revocation Delays and TRO
- DigiCert has repeatedly missed CA/Browser Forum Baseline Requirements (BR) revocation deadlines:
- A “business category capitalization” bug (revocation required within 5 days) where DigiCert delayed for select customers.
- A more serious CNAME validation bug: missing the leading underscore in DNS challenges, breaking an important safety assumption for multi-tenant DNS and hosting providers. BRs require revocation within 24 hours.
- In the CNAME case, a customer (Alegeus) obtained a US temporary restraining order (TRO) blocking revocation of ~70 of ~84k affected certificates.
- DigiCert then delayed revocation for all affected certs for ~5 days, not just the ~70 under the TRO. Many commenters see this as the core violation.
Legal Threat Against Bugzilla Discourse
- Sectigo’s representative pressed DigiCert hard in Bugzilla about:
- Failing to revoke all non‑TRO certs on time.
- Not visibly contesting the TRO or clarifying contract language.
- DigiCert’s outside counsel sent a formal letter threatening potential legal action over those Bugzilla comments, asking for clarifications and assurances.
- Later Bugzilla statements from DigiCert claiming they hadn’t used legal as a “shield” are viewed by many as contradicted by this letter; this triggered the new Bugzilla bug and the HN thread.
How Serious Is the Incident?
- One side: underscore omission is “epic” because it undermines a well-known defense for dynamic DNS / hosted subdomain platforms; by rule, any BR non‑compliance must trigger fast revocation to keep CAs honest.
- Other side: practical exploitation seems unlikely in this case; revoking tens of thousands of certs for what looks like a low‑impact implementation bug feels disproportionate and costly.
Sanctions and “Too Big to Fail”
- Some argue DigiCert’s pattern (revocation delays, TRO handling, legal threats) should lead to distrust and root removal.
- Others say immediate full distrust would break many sites (including major ones) and hurt bystanders; a more realistic precedent is:
- Stop trusting new DigiCert-issued certs after a date.
- Let existing certs expire naturally, as done with Symantec and others.
- There is debate whether such a move would erode trust in centralized PKI or instead demonstrate accountability.
Courts vs. PKI Rules
- Several participants stress that courts can and do override private contracts; a TRO can legally bar revocation even if contracts say otherwise.
- Critics argue DigiCert:
- Should have revoked all non‑TRO certificates within 24 hours.
- Should have contested the TRO more aggressively and/or dropped the customer afterward.
- Defenders note courts move slowly; working with the customer to vacate the TRO in 3–5 days may have been the fastest practical path.
- Some propose CAB Forum policies to:
- Treat use of TROs as evidence a customer is incompatible with public PKI, leading all CAs to refuse them in future.
- Make strong, automatic sanctions against CAs that delay revocation regardless of local legal pressure, so future CAs can point to that when opposing TROs.
Governance and Technical Reform Ideas
- Suggested mitigations and improvements:
- “Future-dated” revocations that are published immediately but become effective later, to satisfy BR timelines while allowing migration time (others think courts would dislike this).
- Multi‑CA or quorum-based revocation mechanisms so that other CAs can revoke when the issuing CA is blocked (possibly across jurisdictions).
- Wider support for name constraints to limit CAs’ scope and reduce blast radius, and to allow safer enterprise/private CAs.
- Better contract language and clear customer onboarding about strict revocation timelines and the impossibility of extensions.
Assessment of DigiCert’s Conduct
- Critical view:
- DigiCert has a pattern of bending BR timelines to placate “special” customers, contrary to both BRs and its own published policies (e.g., on key pinning).
- Using a TRO affecting ~70 certs to delay revocation of ~80k+ looks like opportunistic cover.
- The legal threat against a competitor’s Bugzilla comments is seen as chilling open disclosure and discussion, which is especially problematic for a CA.
- Sympathetic view:
- Bugs and process failures happen even at large CAs; DigiCert disclosed, investigated, and ultimately revoked.
- The practical security delta between 24h and ~120h is seen by some as small compared to the operational risk for critical services; strict rules may be overly rigid.
- The legal letter is framed as standard defensive lawyering rather than an attempt to silence legitimate criticism.
Broader Reflections on Web PKI
- Some commenters see the drama as evidence the ecosystem “works as intended”: public bugs, harsh scrutiny, and real business risk for misbehaving CAs.
- Others worry about:
- Enormous effort spent on edge‑case rule violations (e.g., capitalization) vs. more impactful security work.
- Power concentration in a few browser vendors who control root stores and also operate their own CAs.
- There is widespread agreement that CAs must be held to strict, predictable standards; disagreement centers on how strictly to apply them, how to handle legal conflicts, and what penalties are proportionate for a CA of DigiCert’s size.