Mozilla Offers $10,000 Bounty For Bugs In New SSL Certificate Library
In the wake of the discovery of Heartbleed bug, Mozilla is stepping up its certificate validation efforts
Mozilla is offering up to $10,000 to anyone capable of exposing bugs in its new SSL certificate validation library.
The non-profit organisation has invited the community to test the ‘mozilla::pkix’ library, which replaces some of the Network Security Services (NSS) features and should improve the security of encrypted communications across its product range.
The new library will be integrated into the latest release of Firefox browser, expected in June
The announcement follows the discovery of ‘Heartbleed’ vulnerability in the open source OpenSSL protocol earlier this month.
Hearbleed was present in OpenSSL from March 2012, allowing attackers to obtain the encryption keys used by a website, decrypt any past and future traffic to the protected services and to impersonate those services at will. It was estimated at the time of the discovery that the vulnerability affected the security of as many as two-thirds of websites, including those of social networks and banks.
Leaner certificate library
The mozilla::pkix library combines several existing technologies with some new features to optimise the way an application can establish whether an encryption certificate is valid.
“The new code is more robust because certificate path building attempts all potential trust chains for a certificate before giving up (acknowledging the fact that the certificate space is a cyclic directed graph and not a forest). The new implementation is also more maintainable, with only 4,167 lines of C++ code compared to the previous 81,865 lines of code which had been auto-translated from Java to C,” explained Camilo Viecco, systems engineer at Indiana University by day, and a bug hunter at Mozilla by night.
The new library will make its debut in Firefox 31. Mozilla had already added Transport Layer Security (TLS) 1.2 protocol support in Firefox 27.
The organisation says mozilla::pkix is fully backwards compatible, and every network security protocol currently supported by Firefox will continue to be supported. Mozilla warns that in rare cases, some website certificates will no longer validate with Firefox 31, and says such incidents should be reported.
In order to guarantee the performance of the new library, Mozilla is offering up to $10,000 to security professionals able to find vulnerabilities in mozilla::pkix code. This ‘call to arms’ is not limited to bug-hunters – Mozilla has also invited website developers to help run the new library through its paces before it hits production stages.
Are you a Firefox enthusiast? Take our quiz!