TE
TechEcho
Home24h TopNewestBestAskShowJobs
GitHubTwitter
Home

TechEcho

A tech news platform built with Next.js, providing global tech news and discussions.

GitHubTwitter

Home

HomeNewestBestAskShowJobs

Resources

HackerNews APIOriginal HackerNewsNext.js

© 2025 TechEcho. All rights reserved.

EFF Data Shows Five CAs Compromised Since June

33 pointsby TheloniusPhunkover 13 years ago

2 comments

jbyersover 13 years ago
Original article: <a href="https://www.eff.org/deeplinks/2011/10/how-secure-https-today" rel="nofollow">https://www.eff.org/deeplinks/2011/10/how-secure-https-today</a>
inopinatusover 13 years ago
I don't that we can fix the burgeoning sprawl of dodgy CAs - that horse has already bolted. Moxie Marlinspike's Convergence framework might be a solution but it needs critical mass.<p>We can also create a second validation of every certificate via DNSSEC, which means a counterfeit cert becomes detectable by failing a positive check. This is better and easier than the negative OCSP revocation checking that we currently do, or at least it will be when everyone's recursive resolver supports DNSSEC. Again, this needs critical mass.<p>Unfortunately the IETF has two groups (DANE and PKIX) both working on this in parallel and there is not yet clarity over which DNS record to use or how (TLSA or CAA). However, the DANE group has just published their scope RFC (<a href="http://www.rfc-editor.org/rfc/rfc6394.txt" rel="nofollow">http://www.rfc-editor.org/rfc/rfc6394.txt</a>). So there is progress.