[Cryptography] New SSL/TLS certs to each live no longer than 47 days by 2029
Peter Fairbrother
peter at tsto.co.uk
Thu Apr 17 14:10:48 EDT 2025
On 16/04/2025 21:26, Ron Garret wrote:
>
>> On Apr 16, 2025, at 11:55 AM, Andrew Lee <andrew at joseon.com> wrote:
>>
>> Because it’s literally not any less secure than getting a signed cert from a signer who signs for anybody all the time (eg all of them).
>>
>> As an example - let’s encrypt will issue to anybody who can prove control of a domain
>
> You have contradicted yourself in the span of two sentences. Proving control of a domain is not very secure, but it's not nothing either. It does prevent some level of deterrence to MITM attacks, which would otherwise be utterly trivial. And this deterrent, weak as it may be, is manifestly adequate because the web is not falling apart in the face of rampant MITM attacks.
Actually, if you control a domain name, you can most probably
see/control traffic to/from it anyway. So no MITM needed.
From the user POV, if the cert is issued to domain.com, I'm talking to
those who control domain.com. And (hopefully!) it's DNS lookups. Doesn't
mean they *are* domain.com, just that they control the use of the name.
If the domain in question is paypal.com or barclaysbank.com, Paypal and
Barclays should make damn sure that the real Paypal and Barclays bank
control those names.
Else they are (mostly) liable for fraud, in the UK at least - the
consumer doesn't set the anti-fraud and security standards, the
financial institution does. So it is responsible for failures of them.
Hmmm I wonder why financial institutions don't weigh in on the matter of
the subject? Liability again, I suppose. Are the Financial Institutions
more powerful/influential than the "CA/Browser Forum"?
Peter Fairbrother
More information about the cryptography
mailing list