Chicago IT Support & Cyber Security | Forward Technologies

Chicago-based Forward Technologies delivers IT support and cyber security to businesses in the Chicago area and nationwide.

  • Home
  • Services
    • Outsourced IT Support
    • DMARC Email Security
    • Development
      • Web Development & Facelifts
      • CustomView: Plugin for WordPress
    • Data Recovery Service
    • PPC Marketing Services
    • SEO Services
  • Email Security
    • SPF Basics
    • DKIM Basics
    • DMARC Basics
    • Email Security Consulting
  • Data Recovery Service
  • Blog
  • Contact Us

12 Rogue Certificates for Cloudflare’s DNS Raise Global Security Alarm

September 6, 2025 by Edward Silha

Cartoon-style illustration of a giant padlock labeled “1.1.1.1 DNS” with broken certificate chains, symbolizing compromised trustOn Wednesday, researchers uncovered three improperly issued TLS certificates for Cloudflare’s 1.1.1.1 DNS service, encrypted DNS lookup used by millions. The concern was clear: anyone with those credentials could impersonate Cloudflare’s resolver, decrypt user traffic, or redirect queries to malicious sites.

Further investigation revealed the breach was worse than initially thought. Cloudflare confirmed that Fina CA—a Microsoft‑trusted certificate authority, had in fact issued a total of twelve unauthorized certificates for 1.1.1.1 since February 2024.

Cloudflare revoked all of them and launched a review. So far, there is no evidence any were actively used to spoof its services—but the incident exposed serious flaws in monitoring and response.

How It Happened

The problem began with Fina CA issuing certificates for the IP 1.1.1.1, without the owner’s permission, violating fundamental rules of the trust model. Fina later told Cloudflare the certificates were meant for internal testing and that IP addresses had been entered incorrectly. They added that private keys remained in their secure environment and were destroyed promptly, even before revocation.

That explanation covers the mistake, not the permission breach. Unauthorized issuance, even if unexploited, shakes the foundation of trust on the internet.

How TLS Certificates Should Work

TLS certificates prove that a site or service is authentic. A domain owner generates a public/private key pair and requests a certificate from a trusted Certificate Authority, which verifies ownership using methods like DNS records or domain-based tokens. The CA signs the certificate, which then ships with the server’s key to clients requesting the site. Browsers and systems trust it only if the CA is in their root store.

Mis‑issuance allows anyone with that certificate and a valid private key to impersonate the site. In this case, someone could pretend to be the 1.1.1.1 DNS resolver and intercept encrypted DNS queries—a direct privacy and security risk.

Why It Matters

TLS enforcement is critical to digital trust. Even a single mistake by a CA can allow attackers to snoop on or manipulate millions of DNS queries. Cloudflare acknowledged that their oversight played a role, noting their monitoring system failed for several reasons—first, because IP‑based certs didn’t alert properly; second, because filtering alerts was insufficient; third, because too much noise drowned out domain‑specific signals.

Cloudflare blamed themselves and called it an “unacceptable lapse in security by Fina CA.”

Why Microsoft Became a Talking Point

Fina CA is included only in Microsoft’s root certificate store. Other major vendors; Google, Apple, and Mozilla don’t trust it by default. Experts questioned Microsoft’s position, arguing that if Fina had better oversight, this might never have happened. Microsoft has since responded by flagging affected certificates as disallowed in its store.

What Should Happen Next

This incident underlines the critical need for stronger CA accountability and industry-wide safeguards such as:

  • Better filtering and alerting on IP‑based certificate issuance
  • Expanded Certificate Transparency use across DNS clients
  • Stricter review of which CAs are trusted by operating systems and browsers

Cloudflare said it is implementing these steps immediately, aiming to close loopholes and make monitoring more granular and reliable.

Bottom Line

This isn’t a theoretical threat. It’s a near-miss. TLS and the web’s security model rely entirely on trust between domain owners, certificate authorities, and software vendors. A single broken link in that chain could compromise encrypted traffic globally. Here, the certificates were revoked in time. Let’s hope the industry learns and moves faster next time.

Filed Under: Blog, Cybersecurity, Tech In General Tagged With: 1.1.1.1, CA accountability, certificate authority, certificate mis-issuance, Certificate Transparency, Cloudflare, DNS over HTTPS, DNS over TLS, DNS security, encryption, Fina CA, internet trust, Microsoft root store, Microsoft trust, PKI, TLS certificates, TLS mis-issuance, web security

Social Media

  • Facebook
  • GitHub
  • LinkedIn
  • Periscope
  • Twitter

Forward Technologies
747 N LaSalle
STE 500B
Chicago, IL 60654
(312) 715-7806

Copyright © 2025 — Forward Technologies • All rights reserved. • Privacy Policy •