Logo Logo
  • Platform
    • Products
      • Why Core dna
        See how Core dna transforms your digital business.
      • eCommerce
        Power your eCommerce ambition
      • CMS
        For marketers with vision, not code
      • Automations
        Automate your way to success
      • DXP
        Build, manage, and scale your digital properties in one place.
      By Role
      • Developers
        Modernize your web presence without ripping or replacing anything.
      • Executives
        Empower marketers, free up IT team and slash costs at the same time.
      • Marketers
        Total control, without the development team.
      Company
      • Customers
        Helping power the digital presence of hundreds of customers
      • Features
        Content and commerce features.
      • Services
        From digital transformation strategy to scaling your digital business.
      • Admin login
        Access to Core dna DXP 1 admin
  • Solutions
    • Use Cases
      • B2B
        Go directly to customers with an all-in-one B2B platform.
      • B2C
        Connect to shoppers anytime, anywhere with our B2C eCommerce solution
      • Marketplace
        Multi-vendor eCommerce marketplace platform.
      • Content
        Craft content with ease, then deliver it anywhere.
      • Headless
        A hybrid headless platform loved by marketers and developers.
      • Infrastructure
        Advanced cloud infrastructure built for scale and security.
      By Industry
      • Direct to Consumers / Manufacturing
        Get the tools and experience to thrive in the new direct-to-consumer world.
      • Education
        Create a powerful online presence with your school website.
      • Franchises
        Seamlessly push brand-approved marketing to all locations or specific locations - easily.
      • Retail
        Sell with excellence in-store and online.
      • Media
        Don’t just break news, break news everywhere.
      • Travel & Tourism
        Give travellers the speed and reliability they demand.
      • Membership Organizations
        Empower Your Membership Management with Smart Technology
  • Resources
    • Insights
      • Blog
      • Guides
      • FAQ
      Developers
      • Getting started
      • Documentation
      • API
  • Pricing
  • Partners
    • Why Partner?
    • Program Overview
    • Become a partner
Get started
 
  1. Home
  2. Core dna insights

The Hidden Flaw in Internet Certificates That Shook the Web

The Hidden Flaw in Internet Certificates That Shook the Web
Dmitry Kruglov
June 22, 2021 - (6 min read)

Web Development | Replatform

The internet relies on certificates for security, but what happens when they fail? A recent SSL certificate expiration revealed a critical weakness, leaving major websites inaccessible.

Key takeaways

  • SSL Certificates Ensure Trust – SSL certificates authenticate websites and encrypt data, ensuring secure online interactions.
  • Root Certificate Expiry Can Disrupt Services – The expiration of a root certificate on May 30 caused widespread issues, despite careful planning.
  • Outdated Systems Cause Security Failures – Systems that don’t update their Certificate Authority (CA) bundles or lack cross-signing support faced disruptions.
  • Cross-Signed Certificates Need Proper Handling – Many software applications failed to correctly manage cross-signed certificates, leading to unexpected failures.
In a hurry? Get SSL Certificates Broke The Internet

On this page:

    First of all, why do we need SSL certificates?

    Technically speaking, they should be called TLS certificates because they bear a public key which is used in Transport Layer Security (TLS) protocol to authenticate the server.

    But this is not a technical article, so we will stick to the concepts everyone can understand.

    When you go to your favourite online shopping site, you want to be assured that the site is genuine (no one is trying to lure you on a fake copy of Amazon) and everything you send or receive (like your personal data and shopping choices) is secure.

    So, how do the browsers know that the site is trustworthy and display that padlock near the address bar? The SSL certificate tells them so.

    So, basically SSL certificate is a guy who tells you: "This site is ok".

    But why would you trust this guy you do not know? Let's call this guy Sam. You do not trust Sam, but Mike trusts Sam, and Dennis trusts Mike. You trust Dennis; he is a friend of yours! This way you have a chain of trust, just like SSL certificates do.

    Normally, people have a close circle of friends they trust. So do the browsers. They have a list of root certificates they trust without any reservations, and they would trust any certificate issued (signed) by a chain that leads to one of the trusted root certificates.

    Some browsers (like Firefox) have their own trust store, other browsers rely on the trust store of the operating system they run on.

    Now, imagine the following situation:

    There is a guy called Peter who is trusted by Tom, who is trusted by Vito. Everyone trusts Vito because Vito is the head of a well-known and respected Family.

    Then Vito decides to retire and announces that his son Michael will replace him as the head of the family, and whoever respects Vito must now respect Michael.

    Tom pays his respect to Michael, and everything is good. But one day Vito dies…

    Suddenly, it appears that a group of people respected Michael only because they respected Vito when he was alive and do not recognise Michael as the head of the respected family.

    Things won’t end well for these people… So do the browsers or operating systems which do not regularly update their trust stores.

    Back to Michael's family drama…

    The idea of Michael and Vito ruling the Family business together for some period of time sounds like a very good idea. For Michael, as the new official Head of the Family, it is a good opportunity to get some experience from his father, be introduced to different people etc., for Vito, as a retiring boss, it means that transition of power will be smooth, and the Family business will be in the good hands.

    The same happens in the world of SSL certificates. Sometimes the new root certificates are signed by the older root certificates of the same Certificate Authorities. This is called cross-signing.

    The older root certificates are more widely spread on various platforms and more likely to be trusted. The newer root certificates can take this advantage and be trusted by the systems, even while not being recognised as a root certificate on its own, just by the fact that they are cross-signed by the older (and trusted) root certificate.

    The ultimate guide to Progressive Web App (PWA)

    However, the older root certificates have one critical defect – they expire sooner, and when it happens, the new root certificate is expected to have been disseminated well enough to be respected by the majority of the platforms.

    Unfortunately, this is not as simple as it seems to be…

    Imagine the following situation:

    Knock, knock.
     Who's there?
     It's Peter
     What Peter?
     Tom sent me
     Who is Tom?
     He works for Michael, son of Vito
     Come in...

    Technically, this dialog is quite inefficient. Certainly, there is a room for improvement in this communication. Consider this:

    Knock, knock.
     Who's there?
     It's Peter. Tom sent me. He works for Michael, son of Vito
     Come in...

    Now THAT is a much more efficient communication.

    In the world of TLS/SSL security, this means a quicker turnaround for the initial SSL handshake. For this reason, the server sends not just one, but several SSL certificates which allow to validate the whole chain of trust up to the trusted root certificate without a need to download any intermediary certificates from Certificate Authorities.

    Unfortunately, the following situation may occur:

    Knock, knock.
     Who's there?
     It's Peter. Tom sent me. He works for Michael, son of Vito.
     But Vito is dead.
     Michael is now the boss.
     I know, but… Vito is dead.

    A mention of Vito obviously caused some sort of confusion here. It should not matter anymore that Vito was the Head of the Family.

    Now Michael is the Head and everyone should recognize this fact for their own good. However, a mention of Vito creates two chains of trust, one leading to Michael and another one leading to Vito.

    Image. First of all, why do we need SSL certificates?

    Now it is possible to explain what happened on 30 May when many system administrators around the world woke up early in the morning and discovered an avalanche of alerts from the monitoring systems and the angry customers:

    "Your SSL certificate has expired! We can no longer access your API!!!11111"

    To their relief and astonishment they realized that their site certificates are absolutely fine, and their websites are working in all major browsers without any issues. What would cause such a problem?

    On May 30, one of COMODO (now Sectigo) root certificates expired after 20 years of a happy life.

    This should not have caused any issues, because the replacement root certificate was issued in 2010 and by the end of 2015 it has been disseminated across all major operating systems, browsers and programming frameworks and runtime environments.

    At the same time, the new root certificate was cross-signed by the old one.

    So, why after all these precautions and good planning, expiration of the root certificate causes such a big problem?

    Here are a couple of reasons why:

    Reason #1: The trust store (Certificate Authorities Bundle) is not up to date

    In 2020, if you use Internet Explorer 7 on Windows XP or run an application written in Java on an outdated version of Java Virtual Machine (JVM), it’s highly likely you will not have the most up-to-date list of the trusted root certificates.

    In case of Java, for instance, the new Sectigo root certificate was included in Java 8 Update 51 release on July 14, 2015. The older versions of Java won’t have it.

    Reason #2: The software does not support cross-signed SSL certificates

    Application software developers do not have to worry about all the SSL magic. All they have to do in their apps is just call a URL which starts with 'https://'.

    It is then the responsibility of the operating system components, application programming

    framework or external libraries to handle all TLS/SSL cryptography. Usually, the programmers have very little control.

    One of the most notable TLS implementation libraries is OpenSSL. It is widely used by Internet servers, especially Linux based. Some estimate that about 2/3 of the web relies on OpenSSL.

    Cross-signed certificates support was introduced to OpenSSL in version 1.0.2 released in January 2015. However, this support was optional, which means the software developers had to explicitly enable it in their application, but the majority of software developers did not even know about the cross-signing issue, and nobody did it.

    September 2018 version 1.1.1 of OpenSSL was released where cross-signed certificates support was enabled out of the box. This means that the systems with OpenSSL version earlier than 1.1.1 must be upgraded.

    Image. Reason #2: The software does not support cross-signed SSL certificates

    About 67% of all web servers in the world run on Linux operating systems which have one little problem - package managers.

    Package managers are the cancer of software industry, or a drug, that initially seems like fun, but in the end… it kills.

    This is a topic for a separate article, but the bottom line is:

    You cannot simply update a single package (OpenSSL library) to a new major version, because the dependencies of the newer version may not be compatible with dependencies currently installed, and the other installed packages (e.g. web servers) which depend on OpenSSL may not be compatible with the newer version of it.

    In the end, instead of upgrading just a single package, you may end up with upgrading the whole operating system.

    Imagine the situation:

    You have a flat tire on your new car. You come to a service station and ask them to repair the puncture, but they say they cannot do that because your tire is too old to be repaired and has reached the end of life.

    You say it is okay and ask them to sell a new tire, but they say that no new tires are compatible with your car and the only available option you have is buying a new car; even though your car is just 2 years old.

    This is essentially what happens in the software industry.

    For instance, CentOS 7 is a very popular operating system for web servers. And as of June 2020, it is in the active support stage with the end of life set to be in 2024.

    However, the package manager of CentOS 7 will only let you work with 1.0 branch of OpenSSL which reached the end of life at the end of 2019. It makes this relatively modern operating system obsolete if you want to work with modern TLS cryptography.

    Image 2. Reason #2: The software does not support cross-signed SSL certificates

    Soon after Sectigo's root certificate had expired, a holy war has begun between software developers and system administrators.

    The developers demanded the expired certificate to be removed from the SSL bundle the web servers were sending. The system administrators insisted that the developers should update their own technology stack because only completely outdated systems could not properly deal the cross-signed root certificates where one of them had expired (“I trust Michael, but Michael is a son of Vito and Vito is dead” situation).

    The industry (and the common sense) were on the system administrators' side. All SSL certificate providers who use Sectigo’s certificates and Sectigo themselves issued statements weeks before the expiration date that no action was required, that cross-signing should do its job, that 10 years is more than enough to update the root CA bundles, that amongst several available chains of trust the software should pick the one that is valid, etc.

    Nevertheless, some part of the software industry was not prepared for this trivial event.

    Have questions? Speak with our experts to find your ideal content solution
    Dmitry Kruglov
    Dmitry Kruglov

    Dmitry has over 19 years experience in developing complex web solutions. Before Core dna Dmitry was working in FinTech and Education industries.

    Previous PostYou Just Became The Head of Marketing. What Now?
    Back
    Next PostDigital Transformation Strategy: Myths vs. Reality

    Related guides

    • Guide: How to Choose the Right CMS: The Definitive Guide
    • What is GraphQL: Your Secret Weapon
    • Progressive Web App (PWA): The Ultimate Guide
    • How to design the Perfect eCommerce Website
    • How to Choose the right eCommerce Platform
    See all guides

    Related posts

    How to Choose the Right eCommerce Web Development Approach

    Web Development

    How to Choose the Right eCommerce Web Development Approach
    March 01, 2025 ( 11 min read )
    Webhook vs API? Choose The Right Tool for Your Integrations

    eCommerce Business

    Webhook vs API? Choose The Right Tool for Your Integrations
    February 19, 2025 ( 4 min read )
    Web Development Trends 2025: 27 Trends Shaping the Future of Development

    Web Development

    Web Development Trends 2025: 27 Trends Shaping the Future of Development
    January 17, 2025 ( 10 min read )
    The Truth About SAP Commerce Cloud: Pros, Cons & More

    Web Development

    The Truth About SAP Commerce Cloud: Pros, Cons & More
    January 10, 2025 ( 9 min read )
    Website Replatforming: Smart Move or Hidden Risk?

    Web Development

    Website Replatforming: Smart Move or Hidden Risk?
    January 02, 2025 ( 22 min read )
    No code, big wins! How to built an LMS in weeks

    About Core dna

    No code, big wins! How to built an LMS in weeks
    December 22, 2024 ( 6 min read )
    How to Choose the Right eCommerce Platform for Your Business

    eCommerce Business

    How to Choose the Right eCommerce Platform for Your Business
    December 09, 2024 ( 20 min read )
    CMS Migration Checklist: A Comprehensive Step-by-Step Guide

    Web Development

    CMS Migration Checklist: A Comprehensive Step-by-Step Guide
    December 04, 2024 ( 7 min read )
    eCommerce Website Requirements: The Essential Checklist

    Web Development

    eCommerce Website Requirements: The Essential Checklist
    November 06, 2024 ( 13 min read )
    Franchise Website Development Essentials

    Web Development

    Franchise Website Development Essentials
    October 30, 2024 ( 5 min read )
    4 Tips for Managing a High Traffic Website

    Web Development

    4 Tips for Managing a High Traffic Website
    August 08, 2024 ( 10 min read )
    Open Source vs Closed Source: What You Need to Know

    Web Development

    Open Source vs Closed Source: What You Need to Know
    July 11, 2024 ( 17 min read )
    Solutions by Role
    • Partners
    • Developers
    • Executives
    • Marketers
    Solutions by Need
    • Intranet
    • Event Management
    • Content Management
    • B2b eCommerce
    • B2c eCommerce
    • Headless
    • Marketing
    Solutions by Industry
    • Community
    • Healthcare
    • Finance
    • Technology
    • Hospitality
    • Franchise
    • Education
    • Travel & Tourism
    Company
    • About Us
    • Why Core dna
    • Partner Ecosystem
    • Customers
    • Careers
    • Contact Us
    • G2Crowd Reviews
    Resources
    • Blog
    • Guides
    • Admin login
    • RSS Feed
    • Documentation
    Support
    • Help
    • Videos
    • Network Status
    • GDPR
    • Privacy Policy
    • Terms & Conditions
    • Fair Use Policy
    Get our latest articles
    Success! You've been added to our email list.
    Melbourne

    348 High Street

    Prahran, VIC 3181

    Australia

    +61 3 85639100

    Boston

    55 Court St, Level 2

    Boston, MA 02108

    USA

    +1 617 274 6660

    Berlin

    Belziger Str. 71

    Berlin 10823

    Germany

    +1 617 274 6660

    Go wow them! ™ | Core dna copyright ©  2025.