TE
TechEcho
Home24h TopNewestBestAskShowJobs
GitHubTwitter
Home

TechEcho

A tech news platform built with Next.js, providing global tech news and discussions.

GitHubTwitter

Home

HomeNewestBestAskShowJobs

Resources

HackerNews APIOriginal HackerNewsNext.js

© 2025 TechEcho. All rights reserved.

Reducing the Roots of Some Evil

43 pointsby marcinwalmost 12 years ago

3 comments

tptacekalmost 12 years ago
This is a great post, in which the lead security person at Etsy built a system to determine which HTTPS&#x2F;TLS CA&#x27;s actually got used in traffic from their office to the Internet. Less than 29% of the CAs their browser trusted actually saw any use!<p>This sounds like something to be outraged about but is actually constructive good news: if more people repeat the experiment, someone could invest some engineering time into building a tool that would prune out CAs from browser trust stores. Every CA removed from your browser is one less attack vector.
评论 #6054689 未加载
csearsalmost 12 years ago
This seems ok if you have a tech-savvy user base that understands how to re-add a root certificate if they later hit a legitimate site using one of the removed root certs. If you user base isn&#x27;t that savvy, I&#x27;m afraid you would just be training them to ignore SSL errors, which is not great.<p>Also, I assume the OS and browser vendors do some sort of verification before adding a CA to their list of root certs. Is the message that we shouldn&#x27;t trust their verification efforts? If so, we should probably use something other than popularity to do our own independent verification.
评论 #6054767 未加载
评论 #6055061 未加载
dfcalmost 12 years ago
I have done this by hand by manually &quot;untrusting&quot; all CAs and then enabling them one by one as I go along. I never found a good way to move the lists of CAs across browsers. However for ssl-certificates in Debian propagating the list across different machines was a breeze with etckeeper. Being able to apt-get install cawatch would be a lot easier.<p>Do you really want to rely on China&#x27;s CNIC to make the decision if you should trust a certificate?