[Cryptography] New SSL/TLS certs to each live no longer than 47 days by 2029
Bill Woodcock
woody at pch.net
Thu Apr 24 17:51:57 EDT 2025
> On Apr 24, 2025, at 01:02, Shreyas Zare via cryptography <cryptography at metzdowd.com> wrote:
> Its DNSSECC+DANE that prevents MITM attacks [1]. A web browser supporting DANE wont be vulnerable to the attacks you imagine at all.
Ladybird.
> On the other hand, with traffic re-routing, you can get a SSL/TLS cert from LE if you are on-path to the web server that the domain name resolves to [2]. And then use that cert to do MITM on people you lured to use your public hot spot.
Yep.
> DNSSEC will help protect with DANE. Controlling a hot spot does not make it vulnerable.
Correct.
> Its about time web browsers add support for DANE as an alternative option for people who want to use it.
Yep. I’ve had this conversation with the people who make that decision for several of the browsers, and the problem is that the “big” ones are all completely driven by market-share, rather than security. So they feel that they _cannot_ warn users of MITM, because then they’d be warning users behind enterprise firewalls which MITM their traffic, and users would switch to browsers which “don’t bug them” about that. And they can’t stomach the idea of losing users.
As I said, making everybody secure is hopeless. But we need there to be at least the possibility that people who do need security can get it. CA certs don’t offer that.
-Bill
More information about the cryptography
mailing list