by sanqui on 11/30/24, 9:35 PM with 215 comments
by leonidasv on 12/1/24, 1:49 AM
This is pretty bad. Someone circunvented the ban on emitting public certificates but also disrespected Google's CAA rules. Hope this CA gets banned on Microsoft OSes for good.
by cjalmeida on 12/1/24, 1:32 AM
by danpalmer on 12/1/24, 12:47 AM
by 8organicbits on 12/1/24, 3:23 AM
I'm not a Windows user, but I have to wonder if there's a way to use the Chrome trust store on Windows/Edge. I can't imagine trusting Microsoft's list.
by MattPalmer1086 on 12/1/24, 10:35 AM
Right now, a CA can issue a certificate for any public key and domain they like. A rogue trusted CA can intercept all traffic.
If a certificate also included a signature by the owner of the public key signed by the CA (using their private key, signed over the CA signature), then a CA would no longer have this ability.
What am I missing?
by alwayslikethis on 12/2/24, 2:20 AM
1. https://en.wikipedia.org/wiki/Kazakhstan_man-in-the-middle_a...
by resters on 12/1/24, 1:46 AM
by noitpmeder on 12/1/24, 1:02 AM
by mattfields on 12/1/24, 6:24 AM
ie: Brazilian government demands Microsoft to grant them MITM access from Windows machines, in order for the right to do business in the country.
by coretx on 12/1/24, 4:14 AM
by knowitnone on 12/1/24, 3:29 AM
by b800h on 12/1/24, 8:04 AM
by ThePowerOfFuet on 12/1/24, 9:37 AM
by notorandit on 12/1/24, 8:39 AM
by sabbaticaldev on 12/1/24, 1:37 AM
by ikekkdcjkfke on 12/1/24, 7:32 AM
by II2II on 12/1/24, 4:22 AM
The system is deeply flawed, which is something I realized fifteen years ago when I was put into a situation where I had to use online banking. (Had to being the nearest branch of any bank was an hour long flight away, though there was an ice road you could use in the winter.) One of my first questions of the bank was: who issued their certificate. They didn't have a clue what I was talking about. I suppose I could have pushed the question until I found someone who did know, but I also realized that a random person asking about security would be flagged as suspicious. The whole process was based upon blind trust. Not just trust in the browser vendors to limit themselves to reputable CA, but of the CAs themselves and their procedures/policies, and who knows what else.
by 0xbadcafebee on 12/2/24, 1:57 AM
Yeah, this is after the certificate was issued, and my guess, used.
Also, has anyone tried to look up CT logs lately? I tried. Can get maybe a single FQDN if you look, but trying to do wildcards or name-alikes, nothing worked. Most of the CT searching websites were straight up broken. Clearly nobody is actually looking at CT logs.
CAs are a joke. There's a dozen different ways to exploit them, they are exploited, and we only find out after the fact, if it's a famous enough domain.
We could fix it but nobody gives a shit. Just apathy and BAU.
by xyst on 12/1/24, 3:46 AM
Is anybody else surprised at this point?
by connor11528 on 12/1/24, 3:31 AM
by motbus3 on 12/1/24, 10:08 AM