TE
TechEcho
Home24h TopNewestBestAskShowJobs
GitHubTwitter
Home

TechEcho

A tech news platform built with Next.js, providing global tech news and discussions.

GitHubTwitter

Home

HomeNewestBestAskShowJobs

Resources

HackerNews APIOriginal HackerNewsNext.js

© 2025 TechEcho. All rights reserved.

Mozilla wants CAs to revoke 30 random certificates per year

45 pointsby mirages4 months ago

11 comments

ForHackernews4 months ago
&gt; Would a CA be allowed to pre-notify customers whose certs were randomly selected and {pre&#x2F;re}-issue them replacements?<p>If this is permitted, then I see no problem with this plan. It will force people to do what they already should be doing: have a plan in place to rotate certificates in case of revocation.<p>&gt; The point is that right now revocation is so painful that it’s causing CAs to side with subscriber convenience over the integrity of the web PKI. Sampled, controlled revocations let us identify points of pain before they have security implications, and motivate Subscribers to prepare their systems—whether through automation or not, up to them, I’m not their dad—to tolerate on-time revocation. We care about the likely outcomes of automation, such as tolerance of short revocation or expiry timelines, really, but if BigSlowCo wants to staff a 24-hour cert maintenance squad such that they don’t (successfully) pressure their CA into blowing revocation deadlines, that’s their opex choice. Directly evaluating ecosystem capability around prompt revocation is the only way I can think of to identify areas of danger or weakness before they become issues for the web.<p>This is like testing the fire extinguishers.
alyandon4 months ago
That is a pretty breathtaking example of ivory tower thinking if there ever was one. I really just don&#x27;t know what else I can say about that kind of proposal.
评论 #42657502 未加载
nimish4 months ago
This is classic &quot;we don&#x27;t have a purpose so let&#x27;s cause problems&quot; thinking. WTF!!
评论 #42658248 未加载
Habgdnv4 months ago
And what about revoking the certificate of mozilla.org 30 times instead?
评论 #42658409 未加载
Spivak4 months ago
I think Roman Fischer in the thread has it right, 30 certs is a single drop of water the Atlantic. Like there&#x27;s no wink wink necessary, at that scale it would be flatly <i>irrational</i> to do anything at all to handle being one of these revocations. We&#x27;re taking about a roughly 0.00001% chance that it&#x27;s you. Forget some dumb cert revocation logic I would play Russian Roulette with those odds.<p>But on the flip side those 30 unlucky souls are gonna be <i>pissed</i>. There&#x27;s so many other less disruptive ways you could do this.
评论 #42657863 未加载
tiffanyh4 months ago
Why don’t they revoke the certificate for a special-use domain, like example.com.<p>As opposed to 30-random entities.<p><a href="https:&#x2F;&#x2F;en.m.wikipedia.org&#x2F;wiki&#x2F;Special-use_domain_name" rel="nofollow">https:&#x2F;&#x2F;en.m.wikipedia.org&#x2F;wiki&#x2F;Special-use_domain_name</a>
评论 #42657871 未加载
DuckConference4 months ago
I think the garbage CAs that want to delay certificate revocation way beyond requirements are numerous enough that this proposal won&#x27;t go ahead. Much easier for them to just do nothing and hope they won&#x27;t be the next Entrust.
workfromspace4 months ago
<a href="https:&#x2F;&#x2F;archive.is&#x2F;ZpXIR" rel="nofollow">https:&#x2F;&#x2F;archive.is&#x2F;ZpXIR</a>
seventytwo4 months ago
Why though? What’s the problem this solves?
13174 months ago
that&#x27;s just rude
otabdeveloper44 months ago
Good lord, the PKI infrastructure is a completely batshit clusterfuck.