TE
科技回声
首页24小时热榜最新最佳问答展示工作
GitHubTwitter
首页

科技回声

基于 Next.js 构建的科技新闻平台,提供全球科技新闻和讨论内容。

GitHubTwitter

首页

首页最新最佳问答展示工作

资源链接

HackerNews API原版 HackerNewsNext.js

© 2025 科技回声. 版权所有。

EFF Data Shows Five CAs Compromised Since June

33 点作者 TheloniusPhunk超过 13 年前

2 条评论

jbyers超过 13 年前
Original article: <a href="https://www.eff.org/deeplinks/2011/10/how-secure-https-today" rel="nofollow">https://www.eff.org/deeplinks/2011/10/how-secure-https-today</a>
inopinatus超过 13 年前
I don't that we can fix the burgeoning sprawl of dodgy CAs - that horse has already bolted. Moxie Marlinspike's Convergence framework might be a solution but it needs critical mass.<p>We can also create a second validation of every certificate via DNSSEC, which means a counterfeit cert becomes detectable by failing a positive check. This is better and easier than the negative OCSP revocation checking that we currently do, or at least it will be when everyone's recursive resolver supports DNSSEC. Again, this needs critical mass.<p>Unfortunately the IETF has two groups (DANE and PKIX) both working on this in parallel and there is not yet clarity over which DNS record to use or how (TLSA or CAA). However, the DANE group has just published their scope RFC (<a href="http://www.rfc-editor.org/rfc/rfc6394.txt" rel="nofollow">http://www.rfc-editor.org/rfc/rfc6394.txt</a>). So there is progress.