360
submitted 1 year ago by misk@sopuli.xyz to c/technology@lemmy.world
you are viewing a single comment's thread
view the rest of the comments
[-] hsdkfr734r@feddit.nl 89 points 1 year ago

When I look at the default list of trusted CAs in my browser, I get the feeling that certificate lifetimes isn't the biggest issue with server certificates.

[-] errer@lemmy.world 21 points 1 year ago

The sites I have most frequently have had to add expired certificates to use are US government websites. Particularly those affiliated with the military branches. It’s sad.

[-] jagged_circle@feddit.nl 3 points 1 year ago

Yes X.509 is broken. If you're a developer and not pinning certs, you're doing it wrong.

[-] stinky@redlemmy.com 8 points 1 year ago
[-] jagged_circle@feddit.nl 7 points 1 year ago* (last edited 1 year ago)

What part are you confused about, and are you a developer?

Edit: why was I downvoted for asking this?

[-] semi@lemmy.ml 12 points 1 year ago

I'm a developer and would appreciate you going into more specifics about which certificates you suggest pinning.

[-] jagged_circle@feddit.nl 9 points 1 year ago* (last edited 1 year ago)

I'm saying that if you're a developer of software that communicates between two nodes across the internet, you shouldn't rely on X.509 because the common root stores have historically been filled with compromised CAs, which would let someone with that CA decrypt and view the messages you send with TLS.

You should mint your own certs and pin their fingerprints so that your application will only send messages if the fingerprint of the cert on the other end matches your trusted cert.

[-] semi@lemmy.ml 7 points 1 year ago

OK, so cases where you control both ends of the communication. Thanks for the clarification.

[-] Pieisawesome@lemmy.world 4 points 1 year ago

And your software stops functioning after X years due to this.

Don’t do this, this is a bad idea.

[-] jagged_circle@feddit.nl 2 points 1 year ago

Yeah, fuck the users. We can just slap "100% secure" on the box and who cares if some woman is raped and murdered because we decided not to follow best security practices, right? /s

[-] cheesemoo@lemmy.world 7 points 1 year ago

That's a hell of a leap there chief.

[-] TarantulaFudge@startrek.website 1 points 1 year ago

Technically all certificates are pinned, especially with public CAs, most OS package the latest CA certs which will all go out of style within 10 years or so. You can see this by loading up any old distro or defunct version of windows.

[-] oldfart@lemm.ee 2 points 1 year ago

Yeah, now imagine pinning certs that change weekly.

My first thought is that old school secure software (like claws-mail) treats a cert change as a minor security incident, asking you to confirm every time. Completely different school of thought.

[-] jagged_circle@feddit.nl 1 points 1 year ago* (last edited 1 year ago)

You can pin to your own CA. Then it doesn't matter if you want to update your certs frequently.

[-] oldfart@lemm.ee 1 points 1 year ago
this post was submitted on 16 Dec 2024
360 points (100.0% liked)

Technology

77698 readers
3003 users here now

This is a most excellent place for technology news and articles.


Our Rules


  1. Follow the lemmy.world rules.
  2. Only tech related news or articles.
  3. Be excellent to each other!
  4. Mod approved content bots can post up to 10 articles per day.
  5. Threads asking for personal tech support may be deleted.
  6. Politics threads may be removed.
  7. No memes allowed as posts, OK to post as comments.
  8. Only approved bots from the list below, this includes using AI responses and summaries. To ask if your bot can be added please contact a mod.
  9. Check for duplicates before posting, duplicates may be removed
  10. Accounts 7 days and younger will have their posts automatically removed.

Approved Bots


founded 2 years ago
MODERATORS