• @hsdkfr734r@feddit.nl
    link
    fedilink
    English
    902 days ago

    When I look at the default list of trusted CAs in my browser, I get the feeling that certificate lifetimes isn’t the biggest issue with server certificates.

    • @errer@lemmy.world
      link
      fedilink
      English
      212 days ago

      The sites I have most frequently have had to add expired certificates to use are US government websites. Particularly those affiliated with the military branches. It’s sad.

    • @rottingleaf@lemmy.world
      link
      fedilink
      English
      242 days ago

      People who’d abuse trust into centralized PKI system are not real, they can’t hurt you, because if they abuse it, said system’s reputation will fall to zero, right?

      Except it’s being regularly abused. LOL. And everybody is using it.

      • @oldfart@lemm.ee
        link
        fedilink
        English
        31 day ago

        Yeah, now imagine pinning certs that change weekly.

        My first thought is that old school secure software (like claws-mail) treats a cert change as a minor security incident, asking you to confirm every time. Completely different school of thought.

          • semi [he/him]
            link
            fedilink
            English
            132 days ago

            I’m a developer and would appreciate you going into more specifics about which certificates you suggest pinning.

            • @jagged_circle@feddit.nl
              link
              fedilink
              English
              6
              edit-2
              2 days ago

              I’m saying that if you’re a developer of software that communicates between two nodes across the internet, you shouldn’t rely on X.509 because the common root stores have historically been filled with compromised CAs, which would let someone with that CA decrypt and view the messages you send with TLS.

              You should mint your own certs and pin their fingerprints so that your application will only send messages if the fingerprint of the cert on the other end matches your trusted cert.

              • semi [he/him]
                link
                fedilink
                English
                71 day ago

                OK, so cases where you control both ends of the communication. Thanks for the clarification.

                • TarantulaFudge
                  link
                  fedilink
                  English
                  113 hours ago

                  Technically all certificates are pinned, especially with public CAs, most OS package the latest CA certs which will all go out of style within 10 years or so. You can see this by loading up any old distro or defunct version of windows.

                • @jagged_circle@feddit.nl
                  link
                  fedilink
                  English
                  -62 days ago

                  Yeah, fuck the users. We can just slap “100% secure” on the box and who cares if some woman is raped and murdered because we decided not to follow best security practices, right? /s