#CAcert

Kevin Karhan :verified:kkarhan@infosec.space
2025-06-20

@alios no, but besides #OpenPGP there are compatible interpretations like enc that just work!

Jan Wildeboer đŸ˜·:krulorange:jwildeboer@social.wildeboer.net
2025-06-10

This topic has been occupying my brain cycles for quite some time now. It's already so deep down that I spontaneously sing "I am CA" to the Village People's YMCA song :) So it's time to share with you all and get more input. (CA is Certification Authority in x.509 lingo, I'll explain it all in my blog series :) (Why didn't #cacert think about this many years ago? Damn ;)

#nerdcert

Kevin Karhan :verified:kkarhan@infosec.space
2025-06-10

@qbi ja, #CACert und woanders.

Mehr kann ich dazu nicht sagen außer dass ich auf #PGP-basertes #2FA umstelle...

Kevin Karhan :verified:kkarhan@infosec.space
2025-03-25

@aral @EUCommission @nlnet call me weird but the developments of @letsencrypt vs. @cacert shows everything wrong with the way #SSL works.

We would've had a superior alternative to #LetsEncrypt if #GAFAMs weren't able or even allowed to cockblock #CACert by refusing to import it's ROOT-CA, whilst every commercial #CA gets their keys imported, no matter how shit they are or that they are essentially a hostile state actor!

Colin Cogle :verified:colin@colincogle.name
2025-03-12

@vlpatton The classic method is a key signing party. Get a bunch of people in the same room with legal photo identification and their fingerprints, and go around the room checking everyone else’s ID. Then, go home and sign everyone’s keys. Send the signed key to the key owner. Import signed keys and collect signatures!

Key servers sharing signatures haven’t been a thing since the attacks years ago. Any modern keyserver will strip the signatures, so you’ll have to distribute your key with signatures some other way (WKD, DNS, a file on your web site, etc.).

CAcert will do PGP key endorsements if you get enough assurances on their platform. Everyone with a signed key has had two forms of ID checked by two people. However, their infrastructure can only work on old-school RSA keys right now (they’re working on modernizing).

#PGP #GnuPG #CAcert #KeySigningParty #cryptoparty #WebOfTrust

Kevin Karhan :verified:kkarhan@infosec.space
2025-02-25

@thomas @BjornW @letsencrypt we had that one (minus LE involvement).

It merely got cockblocked by #GAFAMs who refused to accept it as #CA...

Juergen M. Brucknerjuergen@bruckner.email
2025-02-03

@leyrer
Ich sagte nicht, dass er tatsĂ€chlich "vertrauenswĂŒrdig" ist. Aber Faktum ist, dass es diesen und zwei weitere "Vertrauensdiensteanbieter" in Österreich gibt. Und es bieten alle Drei auch S/MIME kompatible Zertifikate an.

Aber Du hast im Grunde schon recht, da geniesst bei mir #CAcert höheres Vertrauen als die drei zusammen.

Andreas Grupp :tux: :opensuse:angry@social.tchncs.de
2024-10-19

FĂŒr CAs ist es mit der Entfernung des <keygen> Element aus dem HTML Standard in der Tat nicht mehr so einfach die Private Keys komfortabel im Browser des Kunden erstellen zu lassen, diese in dessen Zertifikatsverwaltung zu schieben, ... aber #CAcert hat eine technische Lösung gefunden (siehe blog.cacert.org/2024/02/finall - auch wenn CAcert als allgemeine CA mangels Integration in den Browsern ausscheidet).

6/x

@Lioh @gnulinux

2024-09-26

#cacert still exists?

Axel ⌹🐧đŸȘđŸšŽđŸ˜· | R.I.P Natenomxtaran@chaos.social
2024-09-26

Just got a mail notification that #CAcert relocated its association from Australia to #Switzerland, namely to #Geneva.

Wasn't aware that they're still alive and active after all the degradation due to expired and cryptographically outdated root certificates, etc.

2024-09-21

Ich habe soeben zwei Wesen bei CaCert (re-)assured. Und dabei festgestellt das mein Engagement mit #CaCert schon 19 Jahre lÀuft. Hut ab, das es die Organisation schon so lange gibt!

2024-07-25

20 Jahre #CAcert und immer noch ist der Nutzen sehr begrenzt.

Dipper aus Gravity Falls hÀlt einen Zettel mit »35 assurance points« in den HÀnden und sagt: »Whoa. This is worthless!«
Kevin Karhan :verified:kkarhan@infosec.space
2024-07-10

@MichalBryxi yeah...

As much as I'm still angry at #Microsoft, #Apple and #Mozilla for blocking #CACert to this day, @letsencrypt is a net positive.

  • Tho I've had to deal with more "serious business" where that wouldn't cut it. #PCIDSS demands #EV-#SSL for #PaymentProcessors and that is a process in that they actually do #KYC a company and #ID #CEO & #CFO (cuz I was in charge of updating said cert and had to wait for that to complete)...

And for the upper triple digits that cert costs per year, the process went quite fast and it took like 5 mins tops.

Kevin Karhan :verified:kkarhan@infosec.space
2024-06-26

@drwho Shit like this makes me hate not just #snap but @letsencrypt because that's more code than the entire backend for @cacert ...

  • Seriously, there's no valid reason for #LetsEncrypt to take up more space than the acme.sh & #CertBot scripts they made AND certainly not more than the #API for #CAcert back in it's days...

I think there needs to be more and harder pushes for #FrugalComputing because there's no valid reason they basically shove an entire #OS onto an existing one...

  • And even if there was there shure as hell is none for something beyond the ~ 4 MB that #mkroot as a reference implementation of #toybox requires...
Kevin Karhan :verified:kkarhan@infosec.space
2024-06-24

@DeltaWye TBH, using a #VPN.is a cheap and old #Ghettohack that had it's right to exist before #CAcert, #LetsEncrypt and at a time where #EV-#SSL certs we 4-5 digits before taxes but there are reasons this isn't compliant to #PCIDSS anymore...

Kevin Karhan :verified:kkarhan@infosec.space
2024-06-11

@rysiek the only thing that pisses me off re: #LetsEncrypt is tuat they basically got #VC-#TechBro #FastLane in regards to acceptance whilst #CaCert got #Cockblocked by #GAFAMs all day despite doing actual #DueDiligence re: who gets a #certificate.

But better @letsencrypt than no #SSL, even tho I think #X509 is bad and ibstead we should've #OpenPGP-based #encryptioncfor everything...

2024-05-31

Ich habe in der Vergangenheit meine Zertifikate bei immer erstellt, in der Hoffnung, dass die es frĂŒher oder spĂ€ter es hin bekommen mit der Integration ihrer Stammzertifikate.
Leider bis heute noch nicht. :(

Welcher Anbieter ist aktuell empfehlenswert?

CAcertcacert
2024-04-23
Colin Cogle đŸ””colincogle
2024-01-27

@wez @voltagex I purchased a code signing certificate from SignMyCode.com and it’s worked great. Though I bought it before the HSM requirements went into place, I don’t automate anything with it — though it’s a tempting idea.

There’s always , but they’ll probably never be globally trusted.

Kevin Karhan :verified:kkarhan@mstdn.social
2023-12-08

@ljrk @lexd0g SSL is trash because it requires value-removing middlemen aka. CAs to work and the inherent structures in IT cockblocked community-based CAs like #CACert for digital philantropy aka. @letsencrypt / #LetsEncrypt...

SSL is systemically bad and unfixable per design - period.

I don't see the added value of Passkeys over API-Keys, Login-Cookies and proper Login Managment...

Client Info

Server: https://mastodon.social
Version: 2025.04
Repository: https://github.com/cyevgeniy/lmst