TE
科技回声
首页24小时热榜最新最佳问答展示工作
GitHubTwitter
首页

科技回声

基于 Next.js 构建的科技新闻平台,提供全球科技新闻和讨论内容。

GitHubTwitter

首页

首页最新最佳问答展示工作

资源链接

HackerNews API原版 HackerNewsNext.js

© 2025 科技回声. 版权所有。

Certification Authority/Browser Forum adopts new security standards

62 点作者 terminalbraid大约 2 个月前

6 条评论

notepad0x90大约 1 个月前
Cheaper code-signing certs would be great. I don't like how the CA/B is so focused on TLS only. PKI is a slightly wider landscape. I sincerely hope PKI-centric code and package signing makes its way to the Linux world where most influential people in these discussions live, so they can appreciate the importance of having a "letsencrypt" for other types of PKI usage like S/MIME and Authenticode.
评论 #43569965 未加载
infogulch大约 1 个月前
Glad to see DNS validation from multiple perspectives, that&#x27;s a scary attack vector.<p>I wonder if we can ever hope for CA&#x2F;B to permit name constrained, short lifespan, automatically issued intermediate CAs, authenticated with something like a DNS-01 challenge. I&#x27;ve advocated for this before [1][2], but here&#x27;s my pitch again:<p>I want to issue certificates from my own ICA for my homelab and office, to avoid ratelimits and hide hostnames for private services. I submit that issuing a 90-day ICA certificate with a name constraint that only allows it to issue certificates for the specific domain <i>is no more dangerous than issuing a wildcard certificate</i>, and offers enough utility that it should be considered seriously.<p>Objection 1: &quot;Just use a wildcard cert.&quot; Wildcard certs are <i>not</i> sufficient here because they don&#x27;t support nested wildcards, and — more importantly — they don&#x27;t allow you to isolate hosts since any host can serve all subdomains. I&#x27;d rather not give some rando vibecoded nodejs app the same certificate that I use to handle auth.<p>Objection 2: &quot;Just install a self-signed CA on all your devices.&quot; Installing and managing self-signed CAs on every device is tedious, error prone, and arguably more dangerous than issuing a 90-day name-constrained ICA.<p>Objection 3: &quot;Aren&#x27;t name constraints not supported by all clients?&quot; On the contrary, they&#x27;ve had wide support for almost a <i>decade</i>, and for those just set the critical bit.<p>I understand this is not a &quot;just ship it lmao&quot; kind of change, but if we want this by 2030 planning for it needs to start happening <i>now</i>.<p>[1]: <a href="https:&#x2F;&#x2F;news.ycombinator.com&#x2F;item?id=37537689">https:&#x2F;&#x2F;news.ycombinator.com&#x2F;item?id=37537689</a><p>[2]: <a href="https:&#x2F;&#x2F;news.ycombinator.com&#x2F;item?id=29808233">https:&#x2F;&#x2F;news.ycombinator.com&#x2F;item?id=29808233</a>
评论 #43568221 未加载
评论 #43569375 未加载
评论 #43590226 未加载
评论 #43568559 未加载
pabs3大约 1 个月前
Hopefully they also adopt the ACME revocation extension proposed in the Revokinator FAQ.<p><a href="https:&#x2F;&#x2F;pwnedkeys.com&#x2F;revokinator" rel="nofollow">https:&#x2F;&#x2F;pwnedkeys.com&#x2F;revokinator</a>
评论 #43569948 未加载
tptacek大约 1 个月前
Notably, I think LetsEncrypt has been MPIC for some time now.
评论 #43560919 未加载
Y-bar大约 1 个月前
How will this impact self-signed local certificates? Can we still use a five-year lifespan on those or do we need to reduce it to &lt;398 days?
评论 #43559268 未加载
评论 #43559253 未加载
评论 #43560211 未加载
amiga386大约 1 个月前
What does this mean for CAs that issue certs for completely internal corporate DNS?<p>Does this mean the corporations have to reveal all their internal DNS and sites to the public (or at least the CA) and let them do DV, if they want certs issued for their wholly-internal domains that will be valid in normal browsers?
评论 #43560133 未加载