Menu
IT manager gets certificate for Microsoft domain, tries to report it but gets in trouble

IT manager gets certificate for Microsoft domain, tries to report it but gets in trouble

He tried to alert the company in January, but the company never got his emails, and later suspended his Microsoft account

Oversight allowed researcher to register live.fi administrative email addresses.

Oversight allowed researcher to register live.fi administrative email addresses.

After a security enthusiast discovered a loophole that allowed him to register a valid SSL certificate for Microsoft's live.fi domain, he tried to responsibly disclose the issue. But instead of thanks he got locked out of his email, phone, Xbox and online storage accounts.

The issue was discovered by a Finnish man who works as an IT manager for a company in the industrial sector. He talked to the IDG News Service, but requested anonymity.

Microsoft's Outlook.com email service allows users to have multiple email addresses called aliases under a single account. At the moment, the service only allows aliases to be created on the @outlook.com domain, but several months ago more domains were available.

Around six months ago the Finnish IT manager, who already had a @live.fi and @live.com address, got the idea to check if he could register any privileged usernames as his additional aliases.

Privileged usernames like admin@, administrator@, postmaster@, hostmaster@ and webmaster@ are typically reserved for use by domain name owners for administrative purposes, but the IT manager managed to register hostmaster@live.fi, security@live.fi and hostmaster@hotmail.fi as his aliases because Microsoft did not block them.

Initially he thought that he might receive potentially sensitive email messages intended for the domain owner and that he would then report the issue, but as time passed, no email came for those addresses. Then, in January he got the idea to try to obtain an SSL certificate using one of the addresses.

He chose a certificate authority called Comodo because the company offers certificates for free that are valid for 90 days and because it accepts domain ownership verification through admin-type email addresses.

According to the IT manager, he obtained the certificate late on January 26 and the whole process took around 10 minutes which made him believe that it was fully automated. The following day he reported the issue to CERT-FI, which is part of the National Cyber Security Centre Finland.

He also claims that he reported the issue to an email address listed as contact for the live.fi domain on Jan. 31 and to security@microsoft.com on Feb. 24, but he received no response from either address. It's worth noting that the proper contact email at Microsoft for reporting vulnerabilities is secure@microsoft.com, not security@microsoft.com. However, according to a Microsoft blog post from 2006, there should be an automatic response from security@microsoft.com with information about the proper contact.

Microsoft issued an update Monday to blacklist the improperly issued certificate, but not before suspending the IT manager's account on March 12. This locked him out not only from his email, but also OneDrive, Xbox Live, Lumia phone and other Microsoft services. Microsoft finally unlocked his account today.

"Of course, not all the decisions I made were smart, but I tried my best," he said, referring to how he handled the investigation and reporting of the issue.

"Through our own investigations, independent from the researcher, we identified and have fixed the misconfiguration that was allowing people to create accounts reserved for Microsoft's use," a Microsoft representative said via email Wednesday.

The Microsoft representative added that it is "standard practice" for the company to disable accounts where there may be a violation of Microsoft's terms of service or where a security risk could be present, and to guide account holders on how to recover access the next time they try to log in. "Through this process, we contacted the researcher and are working with him to restore his account," the representative said.

The IT manager confirmed after Microsoft sent its statement that he regained access to his account.

Administrative email addresses need to be reserved from the start, so that nobody can use them maliciously, said Frans Rosén, co-founder of Web security firm Detectify, via email. Some certificate issuers manually verify domain ownership, but such email addresses, along with those listed in domain whois records, are often accepted for verification by default, making their hijacking really dangerous, he said.

Rosén expressed surprise that Microsoft failed to protect those usernames, saying that this is a fairly commonly known problem for services that allow user-generated email addresses.

Researchers at Detectify recently investigated how forgotten subdomains can be abused by attackers, possibly to obtain SSL certificates which could then be used in man-in-the-middle attacks.


Follow Us

Join the New Zealand Reseller News newsletter!

Error: Please check your email address.

Tags online safetyMicrosoftsecurityencryptionExploits / vulnerabilitiespki

Featured

Slideshows

Kiwi channel comes together for another round of After Hours

Kiwi channel comes together for another round of After Hours

The channel came together for another round of After Hours, with a bumper crowd of distributors, vendors and partners descending on The Jefferson in Auckland. Photos by Maria Stefina.​

Kiwi channel comes together for another round of After Hours
Consegna comes to town with AWS cloud offerings launch in Auckland

Consegna comes to town with AWS cloud offerings launch in Auckland

Emerging start-up Consegna has officially launched its cloud offerings in the New Zealand market, through a kick-off event held at Seafarers Building in Auckland.​ Founded in June 2016, the Auckland-based business is backed by AWS and supported by a global team of cloud specialists, leveraging global managed services partnerships with Rackspace locally.

Consegna comes to town with AWS cloud offerings launch in Auckland
Veritas honours top performing trans-Tasman partners

Veritas honours top performing trans-Tasman partners

Veritas honoured its top performing partners across the channel in Australia and New Zealand, recognising innovation and excellence on both sides of the Tasman. Revealed under the Vivid lights in Sydney, Intalock claimed the coveted Partner of the Year 2017 (Pacific) award, with Data#3 acknowledged for 12 months of strong growth across the market. Meanwhile, Datacom took home the New Zealand honours, with Global Storage and Insentra winning service provider and consulting awards respectively. Dicker Data was recognised as the standout distributor of the year, while Hitachi Data Systems claimed the alliance partner award. Photos by Bob Seary.

Veritas honours top performing trans-Tasman partners
Show Comments