A Spotify Publisher Was Down Monday Night. The Culprit? A Lapsed Security Certificate (npr.org) 41
On Monday night, some Spotify users went to download their favorite podcasts and were met with an error. By Tuesday morning, the issue was resolved. What was the source of the massive disruption impacting some of the platform's biggest producers? An expired security certificate. From a report: The SSL security certificate is what keeps a website secure by enabling encryption, giving it the "s" in HTTPS. For Megaphone, the podcast advertising and publishing platform Spotify acquired in 2020, the certificate expired Monday evening. Shortly thereafter, publishers and listeners for Megaphone-hosted podcasts experienced service disruptions. "Megaphone experienced a platform outage due to an issue related to our SSL certificate," a Spotify spokesperson told NPR. "During the outage, clients were unable to access the Megaphone CMS and podcast listeners were unable to download podcast episodes from Megaphone-hosted publishers. Megaphone service has since been restored." The entire outage lasted for about nine hours, with Megaphone publishing real-time updates of the issue. Some podcast publishers took to Twitter to express their frustration business implications of the outage, according to Verge.
Bureaucracy at its finest (Score:1)
This wouldn't have happened if they were using Let's Encrypt.
Re: (Score:3)
Let's Encrypt is not a guarantee and the required 90 day renewal cycle is overly aggressive.
The last time a cert expired on me, I wrote a little script that gets the expiry date of certs and sends an email reminder 7 days prior to expiry if any of them are about to expire. One of my Let's Encrypt certs almost expired one time after that. My script saw the upcoming expiring cert and notified me. No one else noticed since no outages occurred but there would have been. Let's Encrypt is an improvement but i
Re: (Score:2)
Re: (Score:2)
Re: (Score:3)
This problem keeps happening, and it is somewhat baffling. When you get the cert, you know when it expires. If your company operations depend upon this, then add a note to your calendar to renew it. And don't just have a few days reminder, you can have a one month or two of overlap. Especially true if these are self-published certificates that you generate in-house, I'm baffled how those can be allowed to expire only to cause a scramble.
This isn't really a technological problem, it's an organizational p
Re: (Score:2)
You can even monitor expiry dates with nagios.
Re: (Score:2)
Axway Validation Authority can monitor for expired, fraudulent, or revoked certificates. It can also be configured to monitor for soon-to-expire certificates and send email notifications to the responsible group. The defaults are 14 days before the certificates expire and notifications sent every 60 minutes, but these intervals can be configured as desired.
Axway Certificate Expiration Warnings [axway.com]
Re: (Score:2)
Just use Certbot. You're not the first person to need LE certificates automatically renewed. Others had the same problem and it's been solved for a while.
Re: (Score:1)
I was certainly being a bit glib in my original post, but my point was that there are really simple solutions to this problem, and yet it keeps happening through a combination of IT staff incompetence and the established CAs making cert registration and renewal way more of a convoluted process than it needs to be.
Re: (Score:3)
The 90 day renewal cycle is "overly aggressive" to make sure your renewal scripts actually work!
Re: (Score:2)
+1! I'm doing Nginx on OpnSense with ACME Client tied into my account on Let's Encrypt and don't even have to worry about renewing certs. Setting up a new server is a breeze, too: set up my DNS, create the reverse proxy in Nginx, create a record in ACME Client, have it get the cert, and bam! All I'm missing is to throw salt on it over my elbow!
But, in reality, you can blame every mofo fear monger out there who pushed SSL, especially Apple, with their browsers not trusting any certificate that's over 13 m
Re: Bureaucracy at its finest (Score:2)
Re: (Score:2)
Except that anyone can go to their website (https://www.megaphone.fm/) and look at the certificate, and lo-and-behold it is issued by Lets Encrypt.
Re: (Score:2)
This wouldn't have happened if they were using Let's Encrypt.
ITYM:
This wouldn't have happened if they weren't using certificates.
Re: (Score:2)
Wait, the IT guy probably had a calendar, but then was promoted and all was lost.
Re: (Score:2)
... did Robert X Cringely discover this and inform the Elders of the Internet?
I'm still mad that they turned the internet wireless
A minor service was broken due to a mistake (Score:1)
You shure ?
News? (Score:2)
I miss the good 'ole days (Score:2)
Where everything was text based html and no 's'
Professional work! (Score:2)
It never ceases to amaze me that some IT people cannot even get basic stuff right. Obviously people that would have struggled to get burger-flipping right, but somehow managed to land an IT job. (With apologies to everybody that can competently flip a burger.)
Accept Pinned Certificates (Score:2)
Others have mentioned Lets Encrypt with an API and ninety day renewal which is nice.
Of course if you pin a certificate and it gets updated, things also break. One would think that there would be a way
Re: (Score:2)
If a certificate was valid when it was pinned, there's no reason to not keep accepting it for some period after expiry. (Passports are often accepted for six months post the expiration date as an example.)
It depends on what you are using the certificate for. At a high level certificates provide a public / private key pair which is used for both encryption and for identity assurance. Proper control of the private key assures that the encryption is solid and that the holder of the private key is who they say they are. If the private key is exposed or compromised, you are no longer assured that encryption will keep the communication private or that the entity on the other end of the network is who they say they
Re: (Score:2)
Http
Re: (Score:3)
"(Passports are often accepted for six months post the expiration date as an example.) "
If you want a certificates to last for 6 months beyond its expiration date... just issue certificates that last 6 months longer in the first place.
All a 'grace period does' on pinned certificates does is make everything more complicated (code, maintainance, validation) for no real benefit except that the date you set it to expire is not the date it "really" expires now in some cases.
Right now a certificate is either vali
Re: (Score:2)
Re: (Score:2)
Right, ok... I'm not seeing why you want the server to present two?
Are you thinking the client should 'update' its pinning automatically, if the server presents a pinned cert, and then says ... here's the coming replacement, update your pin list.
That's an interesting suggestion, but I'm not sure many clients that use certificate pinning would want to risk the possibility of automatically pinning a malicious cert -- what if the server had been compromised and the hackers added their own certs -- you wouldn't
Re: (Score:2)
Re: (Score:2)
" the client has better information upon which to base a decision"
Information yes, but not necessarily good information.
You know you are talking to the same server, but you don't know if its compromised and offering you "evil" certs.
Most pinning isn't appropriate anyway in my opinion and can do as much harm as good. And where pinning is appropriate the pin list is coming from a secondary channel (e.g. as part of the client software updates) rather than directly from the server offering the certificate.
Re: (Score:2)
Re: (Score:2)
welcome to the future (Score:2)
"Sorry, your toaster oven isn't working this morning. We didn't patch the security hole in it's remote access protocol and someone was mining crypto with it, so we remotely disabled all the toasters. Maybe you'd like to try cereal this morning?"