by iancarroll on 6/27/24, 5:22 PM with 111 comments
by bpfrh on 6/28/24, 6:09 PM
https://groups.google.com/a/ccadb.org/g/public/c/29CRLOPM6OM...
by xeeeeeeeeeeenu on 6/28/24, 2:35 PM
How dysfunctional does a company have to be to let this happen?
by mikeiz404 on 6/28/24, 6:22 PM
I was wondering how Chrome was able to revoke a certificate based on time without trusting the CA to not back date certificates and it looks like this is due to being able to trust certificate transparency logs instead. This is where they get the signed certificate timestamps (SCT) from.
by aaomidi on 6/28/24, 4:01 PM
I’m also an author on https://webpki.substack.com. I will be writing my thoughts on the distrust soon.
I can try to answer any questions folks may have. I can also help folks find ways they can also be involved!
Root programs can only do so much and need surveillance of the CAs from the community.
by zX41ZdbW on 6/28/24, 8:57 PM
by 1oooqooq on 6/28/24, 9:48 PM
https://groups.google.com/a/ccadb.org/g/public/c/29CRLOPM6OM...
by dextercd on 6/27/24, 6:56 PM
And for a CA, credibility is everything
by amluto on 6/28/24, 9:38 PM
This continues to annoy me. Chrome (and other browsers) have detailed trust constraints, e.g. SCTNotAfter, in their own root stores. Why can’t administrators do the same thing?
by nahikoa on 6/27/24, 6:22 PM
Directly from Entrust: "Yes, there has been ongoing internal discussion and reflection on the issues found in this and other incidents, which has led to the action items described previously and ongoing changes, including the decision to revoke the certificates affected by this bug. Exceptional circumstances would need to be provided and justified by the Subscribers. Given the nature of the feedback we have received to date, we doubt that the community has any real interest in anything that Entrust could suggest, except to use against Entrust in a destructive, not constructive, way. We therefore would like more explicit and clear guidelines or a definition of “exceptional circumstances” to be adopted and applied equally to all CAs, perhaps through updates in the CA/B Forum requirements."
by kseifried on 6/28/24, 3:48 PM
it looks like Entrust is selling on the order of a few dozen certs a week to maybe upwards of 100-200.
EDIT: I've asked Google if Gmail will be discontinuing support for Entrusts VMC certificate (and thus BIMI logos), I would guess not since BIMI has some actual requirements, but assumptions are not the best way to make decisions about risk (like our BIMI logo not working later this fall).
by lambdaone on 6/29/24, 11:25 AM
There's now also the problem of competing with a free alternative that increasingly almost everyone knows about.
by rxu on 6/28/24, 2:32 PM
by Animats on 6/29/24, 12:43 AM
Wonder how secure that is? That has real potential for extracting value.
by crazysim on 6/27/24, 5:57 PM
chase.com aa.com
by noname120 on 6/28/24, 2:25 PM
by Tfoote01 on 7/8/24, 1:01 AM
by ranger_danger on 6/29/24, 8:11 PM
by dextercd on 6/28/24, 11:48 PM
by cedws on 6/28/24, 4:30 PM