TE
TechEcho
Home24h TopNewestBestAskShowJobs
GitHubTwitter
Home

TechEcho

A tech news platform built with Next.js, providing global tech news and discussions.

GitHubTwitter

Home

HomeNewestBestAskShowJobs

Resources

HackerNews APIOriginal HackerNewsNext.js

© 2025 TechEcho. All rights reserved.

Expect-CT Lite: A humble proposal for minimal CT enforcement in TLS certificates

3 pointsby hlandauover 1 year ago

1 comment

KirillPanovover 1 year ago
This is a really good idea.<p>&gt; while it does not protect against a compromised CA<p>Although it does <i>prove</i> that a CA has been compromised. That significantly raises the kind of &quot;compromise&quot; that the CA would need to have suffered.<p>...<p>It may confuse people that you have chosen a name which affiliates your proposal with something (&quot;Expect-CT&quot;) which was recently deprecated.<p>I also suggest simplifying it to merely require method (1). In other words: &quot;non-browser TLS clients should require an embedded SCT (RFC 9162 section 7.1.2)&quot;.<p><a href="https:&#x2F;&#x2F;datatracker.ietf.org&#x2F;doc&#x2F;html&#x2F;rfc9162#section-7.1.2" rel="nofollow noreferrer">https:&#x2F;&#x2F;datatracker.ietf.org&#x2F;doc&#x2F;html&#x2F;rfc9162#section-7.1.2</a><p>Requiring that a non-browser TLS client implement OCSP is a pretty big burden. Since OCSP uses HTTP this imposes a &quot;must speak HTTP&quot; mandate on all TLS clients! HTTP has become an incredibly complex protocol over the years. It would also make me very uneasy if all of my TLS client software had to have the ability to reach out and contact arbitrary servers.<p>Perhaps even: &quot;newly-introduced TLS-based protocols should require that clients reject server certificates which lack an embedded SCT, but the client need not validate the SCT&quot;.