Aaron Gable · @asg
211 followers · 407 posts · Server hachyderm.io

Apropos of nothing, here's a fun question at the intersection of and the . Given the following sentence:

"...has determined that using the FQDN in the Certificate is no longer legally permitted."

which of the following two things do you think is no longer legally permitted?

#linguistics #webpki

Last updated 2 years ago

LisPi · @lispi314
282 followers · 4213 posts · Server mastodon.top

@dalias Within the notion of fixing the nightmare, that does sound promising.

I still think ' vulnerability to government pressure in general is a fatal design flaw, but blaming for it is not reasonable.

#webpki #dns #dnssec

Last updated 2 years ago

Michael Paepcke · @paepcke
5 followers · 15 posts · Server infosec.exchange
Aaron Gable · @asg
174 followers · 288 posts · Server hachyderm.io

Do you like security? Do you like privacy? Cryptography? Do you like working for a public benefit non-profit instead of an investor-beholden corporation?

Let's Encrypt is hiring for someone to join our SRE team and help run the largest Certificate Authority in the world! Come work with me and some of the most wonderful folks in tech, to make the web a better place.

abetterinternet.org/careers/le

#jobs #sre #webpki #security #privacy #cryptography

Last updated 2 years ago

GrapheneOS · @GrapheneOS
2899 followers · 128 posts · Server grapheneos.social

Normally, WebPKI certificates lack a secure issuance process and an attacker able to MITM unauthenticated HTTP(S) can obtain one.

GrapheneOS uses the CAA accounturi feature to securely pin our Let's Encrypt account keys for each of our servers for secure certificate issuance.

#grapheneos #privacy #security #webpki #letsencrypt #accounturi

Last updated 2 years ago

Dataplane.org · @dataplane
24 followers · 6 posts · Server fosstodon.org
rmhrisk :verified: · @rmhrisk
424 followers · 47 posts · Server infosec.exchange

To err is human, to forgive is divine
unmitigatedrisk.com/?p=711

#webpki #acme #failover

Last updated 2 years ago

· @dustinhollenback
2 followers · 1 posts · Server infosec.exchange

From the Washington Post:
Web browsers drop mysterious company with ties to U.S. military contractor

washingtonpost.com/technology/

#webpki

Last updated 2 years ago

rmhrisk :verified: · @rmhrisk
421 followers · 46 posts · Server infosec.exchange

A Boy Scout is always prepared unmitigatedrisk.com/?p=710

#webpki #acme #ari

Last updated 2 years ago

Aaron Gable · @asg
64 followers · 44 posts · Server hachyderm.io

And Eric Rescorla (CTO of Firefox) just published this fantastic writeup about , the EU's attempt to legislate that browsers *must* trust certain root certificates that issue certs, a specific kind of EV cert. It also starts with a great overview of the whole system, in order to set up the argument that eIDAS is Bad for the Internet.

educatedguesswork.org/posts/ei

It goes on to propose alternate designs that achieve the EU's goals without compromising trust. Well worth a read!

#eIDAS #qwac #webpki

Last updated 2 years ago

Aaron Gable · @asg
63 followers · 43 posts · Server hachyderm.io

Ryan Hurst (of Google Trust Services, Google's CA, but obvs not speaking on their behalf) just published a good roundup of some of the major things that need to change in the / ecosystem to evolve in the modern era. Just 5% of CAs issue 99% of TLS certs!

unmitigatedrisk.com/?p=702

Points include:
- Require for all certificate issuance
- Get ACME clients to fail over between CAs
- Use Acme Renewal Info to make mass revocations non-issues
- Do continuous audits

Give it a read!

#webpki #tls #acme

Last updated 2 years ago

Dr. Joseph Lorenzo Hall · @joebeone
819 followers · 104 posts · Server techpolicy.social

From @ekr____@twitter.com: "Can we agree on the facts about QWACs? More than you wanted to know about the eIDAS proposal to regulate how browsers treat certificates" educatedguesswork.org/posts/ei

#eidas #QWACs #webpki #tls

Last updated 2 years ago

Diego Cordoba 🇦🇷 · @d1cor
514 followers · 2248 posts · Server mstdn.io

RT @helpnetsecurity
Researchers shed light on hidden root CAs - helpnetsecurity.com/2021/11/19 - @QIHU_Official @Tsinghua_Uni @UCIrvine

#certificates #https #rootCA #webpki #security

Last updated 3 years ago