TE
TechEcho
Home24h TopNewestBestAskShowJobs
GitHubTwitter
Home

TechEcho

A tech news platform built with Next.js, providing global tech news and discussions.

GitHubTwitter

Home

HomeNewestBestAskShowJobs

Resources

HackerNews APIOriginal HackerNewsNext.js

© 2025 TechEcho. All rights reserved.

Maintaining digital certificate security

295 pointsby ayrxalmost 11 years ago

16 comments

michaeltalmost 11 years ago
Software vendors shouldn&#x27;t list CAs as trusted when they prove they can&#x27;t be trusted - but removing a CA from the trust store breaks things for innocent websites who just chose a crappy CA.<p>Every CA should be required to publish a signed, public list of every certificate they have issued that is currently valid; and no certificate should be considered valid if it isn&#x27;t on a CA&#x27;s public list of certificates.<p>That way, when a CA fucks up like this, vendors could remove their certificates from the root stores, but could grandfather in all their previous certificates so the CA&#x27;s customers have a few months to get a certificate from a decent CA. We could even use the list to contact all the CA&#x27;s customers and advise them of the upgrade deadline.<p>If this CA isn&#x27;t removed from the root store, it sends a message to other CAs: You can issue bad certificates with impunity, and there will be no negative consequences.
评论 #8006238 未加载
评论 #8005841 未加载
评论 #8005715 未加载
评论 #8006261 未加载
评论 #8005827 未加载
评论 #8006136 未加载
评论 #8006318 未加载
评论 #8009175 未加载
blueplanetalmost 11 years ago
Moxie Marlinspike gave a talk at DEFCON 19 about how broken the CA model is and suggested an alternative.<p>The talk - <a href="https://www.youtube.com/watch?v=pDmj_xe7EIQ" rel="nofollow">https:&#x2F;&#x2F;www.youtube.com&#x2F;watch?v=pDmj_xe7EIQ</a> The alternative - <a href="http://convergence.io/" rel="nofollow">http:&#x2F;&#x2F;convergence.io&#x2F;</a>
评论 #8005948 未加载
评论 #8008476 未加载
kylecalmost 11 years ago
Once again, demonstration that the CA model is broken. Why does it make sense for any CA to be able to issue certificates for any domain?
评论 #8006140 未加载
评论 #8005650 未加载
评论 #8006500 未加载
评论 #8005689 未加载
y0ghur7_xxxalmost 11 years ago
<i>This event also highlights, again, that our Certificate Transparency project is critical for protecting the security of certificates in the future.</i><p>No! Certificate Transparency still relays on central authorities. We need to get rid of CAs. TACK + Convergence is the correct solution.
评论 #8005755 未加载
评论 #8006491 未加载
mqzaidialmost 11 years ago
The CCA is so aware of its own vulnerability, it refrains from the use of SSL on its own page <a href="http://cca.gov.in/cca/index.php" rel="nofollow">http:&#x2F;&#x2F;cca.gov.in&#x2F;cca&#x2F;index.php</a> - no https here :)
评论 #8005679 未加载
korzunalmost 11 years ago
&gt; At this time, India CCA is still investigating this incident. This event also highlights, again, that our Certificate Transparency project is critical for protecting the security of certificates in the future.<p>What is there to investigate? If they had a proper system in place this should not require &#x27;investigation&#x27;.<p>While I embrace the global infrastructure, it&#x27;s a bit weird to give authority rights within a country that has a pretty broken legal system (re: Avnish Bajaj, etc).
评论 #8007020 未加载
Karunamonalmost 11 years ago
It&#x27;s because of incidents like <i>this</i> why I call our PKI a scam and a racket. The fact that this is even a thing that can ever happen points to massive, systemic problems in the trust model.
评论 #8007040 未加载
评论 #8007039 未加载
评论 #8006407 未加载
eyearequealmost 11 years ago
Maybe we need a browser add on that warns us when a shady&#x2F;incompetent CA has signed the certificate of the current site we are on? As it sits today there is no repercussion for these terrible CAs that screw up like this.
评论 #8006612 未加载
ntakasakialmost 11 years ago
The CA system is broken, so is BGP with routes being essentially hijacked by the word of mouth protocol. Wonder what the fixes or a reboot of the internet would look like.
评论 #8006635 未加载
bla2almost 11 years ago
It&#x27;s a scary thought that this probably has been going on mostly undetected for over a decade before Chrome added cert pinning.
IgorPartolaalmost 11 years ago
I wonder if having your registrar be the only one able to issue you a cert for your domain would solve this. That way the user can verify that the cert was not only signed by a trusted CA but by a trusted CA for this specific domain.
评论 #8006552 未加载
AlyssaRowanalmost 11 years ago
I wonder if we can map <i>every</i> intermediate?<p>Obviously Certificate Transparency (or any public audit log to some extent, really) helps a <i>bunch</i> with this sort of thing.
danielweberalmost 11 years ago
So when does the CA death penalty occur?
评论 #8006619 未加载
elchiefalmost 11 years ago
I wonder what those other domains were and why Google didn&#x27;t pin them. Is it costly to pin a domain?
chris_mahanalmost 11 years ago
The Cathedral isn&#x27;t finished and it&#x27;s crumbling already.<p>Back to the Bazaar!
higherpurposealmost 11 years ago
&gt; The India CCA certificates are included in the Microsoft Root Store and thus are trusted by the vast majority of programs running on Windows, including Internet Explorer and Chrome.<p>Jesus Christ, the CA system is so broken.