TE
TechEcho
Home24h TopNewestBestAskShowJobs
GitHubTwitter
Home

TechEcho

A tech news platform built with Next.js, providing global tech news and discussions.

GitHubTwitter

Home

HomeNewestBestAskShowJobs

Resources

HackerNews APIOriginal HackerNewsNext.js

© 2025 TechEcho. All rights reserved.

Revocation still doesn't work

8 pointsby moonbootsabout 11 years ago

2 comments

zurnabout 11 years ago
Someone should set up a bet about what point in time more than 50% of MITM attempts with revoked (&amp; Heartbleed-snarfed) certs will be caught by default configured browsers. &quot;Never?&quot;<p>This and lack of PFS are much bigger catastrophes than the OpenSSL debacle in itself.<p>(PFS: supported by TLS but disabled by almost everyone so all your old traffic is decryptable with heartbled cert).
yuhongabout 11 years ago
Personally, I am for a hard fail OCSP option in HSTS or certificate plus OCSP stapling. Default to soft fail with a warning message for now. Remember captive portals can use OCSP stapling too.