TE
TechEcho
Home24h TopNewestBestAskShowJobs
GitHubTwitter
Home

TechEcho

A tech news platform built with Next.js, providing global tech news and discussions.

GitHubTwitter

Home

HomeNewestBestAskShowJobs

Resources

HackerNews APIOriginal HackerNewsNext.js

© 2025 TechEcho. All rights reserved.

Duplicate Signature Key Selection Attack in Let's Encrypt

71 pointsby kklover 9 years ago

3 comments

niksmacover 9 years ago
Fortunately, it was mitigated before Let&#x27;s Encrypt was publicly trusted.. <a href="http:&#x2F;&#x2F;www.ietf.org&#x2F;mail-archive&#x2F;web&#x2F;acme&#x2F;current&#x2F;msg00611.html" rel="nofollow">http:&#x2F;&#x2F;www.ietf.org&#x2F;mail-archive&#x2F;web&#x2F;acme&#x2F;current&#x2F;msg00611.h...</a>
jmhodgesover 9 years ago
To be clear, the challenge types in question where removed from Let&#x27;s Encrypt production config during the private beta period (when we had a strict whitelist of domains allowed to be issued for), had mitigations for them in while they were out, and we deleted the code for them entirely the other day (in <a href="https:&#x2F;&#x2F;github.com&#x2F;letsencrypt&#x2F;boulder&#x2F;pull&#x2F;1247" rel="nofollow">https:&#x2F;&#x2F;github.com&#x2F;letsencrypt&#x2F;boulder&#x2F;pull&#x2F;1247</a> )
mynewtbover 9 years ago
Wait, what good is a signature then if you can craft it? I may have misunderstood, would appreciate a dumbed down answer.
评论 #10725680 未加载