#WebPKI

2025-04-15

Specific schedule:

March 15, 2026 - Cert validity (and Domain Control Validation) limited to 200 days.
March 15, 2027 - Cert validity (and Domain Control Validation) limited to 100 days.
March 15, 2029 - Cert validity limited to 47 days and Domain Control Validation limited to 10 days.

There's gonna be a lot of complaints about this in change control meetings over the next year200 days.

#Certificate #Certificate_Management #CABForum #PKI #WebPKI #SSL #TLS

2025-04-15

Buckle up, kids. Automate your certificate rotations or die trying. WebPKI certificate validity period will be 47 days by 2029. bleepingcomputer.com/news/secu

#Certificate #Certificate_Management #CABForum #PKI #WebPKI #SSL #TLS

2025-01-26

Firefox 136 looks poised to enforce Certificate Transparency.

It may be late, but combined with CRLite (and its other Web PKI progress), it may soon be the browser with the most robust Web PKI support.

While I would still say that Chromium generally wins on the security front, I’m happy to see the gap narrow with time and to see Firefox occasionally inch ahead in some areas.

Originally posted on seirdy.one: See Original (POSSE). #Firefox #WebPKI

2025-01-03

Hmm. #CERTBUND had just revoked their main #WebPKI certificate:

crt.sh/?id=12765055285

It seems, some browsers actually get this information, mine don't.

2024-09-25

New blog post: Post-OCSP certificate revocation in the Web PKI.

With OCSP in all forms going away, I decided to look at the history and possible futures of certificate revocation in the Web PKI. I also threw in some of my own proposals to work alongside existing ones.

I think this is the most comprehensive current look at certificate revocation right now.

#security #WebPKI #LetsEncrypt #TLS #OCSP

2024-08-31

For a blog post I’m writing about dealing with certificate revocation, here are the topics I’m covering:

  • OCSP (inc. stapling, must-staple, the never-adopted expect-staple, discontinuation from BoringSSL and Let’s Encrypt)
  • CRLs, inc. CRLite, CRLSets, and Let’s Revoke.
  • Short-lived certs (inc. ACME-STAR, Delegated Credentials, and notAfter)

Anything else I should cover?

#WebPKI #TLS

2024-06-25

I should stop reading the CA section of the Mozilla bug tracker. Wow can corporations have a hard time understanding plain English.

#WebPKI

2024-05-31

OCSP Stapling: still a thing? I lose track of which of the various attempts at solving #WebPKI revocation are still current.

Pass the SALT Conferencepassthesaltcon@infosec.exchange
2024-05-24

Today, our #WebPKI session 😍

If you weren't sleeping during the last decade, you know that @letsencrypt and #CertificateTransparency (CT) have revolutionized web security ⚡️

#pts24 will welcome no less than:
- Aaron Gabble, #techlead at @letsencrypt
- Philippe Boneff, #techlead of #Google CT team
- and an offensive research by Kévin Schouteeten & Paul Barbé from #Synacktiv on certs issuance in managed K8s env.

IMHO, you shouldn't miss this session!
👉 REGISTER pretix.eu/passthesalt/2024/

Pass the SALT Conferencepassthesaltcon@infosec.exchange
2024-05-14

Soon, we will publish a focused presentation of each of the 9 different sessions (#DFIR, #crypto, #WebPKI etc) that will be given during #pts24 😍

Want to see right now our detailed program?
👉 cfp.pass-the-salt.org/pts2024/

To register (FREE)?
👉 2024.pass-the-salt.org/

Aaron Gableasg@hachyderm.io
2023-03-03

Apropos of nothing, here's a fun question at the intersection of #linguistics and the #webpki. Given the following sentence:

"...has determined that using the FQDN in the Certificate is no longer legally permitted."

which of the following two things do you think is no longer legally permitted?

2023-02-27

@dalias Within the notion of fixing the #WebPKI nightmare, that does sound promising.

I still think #DNS' vulnerability to government pressure in general is a fatal design flaw, but blaming #DNSSEC for it is not reasonable.

Aaron Gableasg@hachyderm.io
2023-01-12

Do you like security? Do you like privacy? Cryptography? Do you like working for a public benefit non-profit instead of an investor-beholden corporation?

Let's Encrypt is hiring for someone to join our SRE team and help run the largest Certificate Authority in the world! Come work with me and some of the most wonderful folks in tech, to make the web a better place.

abetterinternet.org/careers/le

#jobs #sre #webPKI #security #privacy #cryptography

2022-12-17

Normally, WebPKI certificates lack a secure issuance process and an attacker able to MITM unauthenticated HTTP(S) can obtain one.

GrapheneOS uses the CAA accounturi feature to securely pin our Let's Encrypt account keys for each of our servers for secure certificate issuance.

#grapheneos #privacy #security #webpki #letsencrypt #accounturi

rmhrisk :verified:rmhrisk@infosec.exchange
2022-12-01

To err is human, to forgive is divine
unmitigatedrisk.com/?p=711 #WebPKI #ACME #FailOver

From the Washington Post:
Web browsers drop mysterious company with ties to U.S. military contractor

washingtonpost.com/technology/

#webpki

rmhrisk :verified:rmhrisk@infosec.exchange
2022-12-01

A Boy Scout is always prepared unmitigatedrisk.com/?p=710 #WebPKI #ACME #ARI

Aaron Gableasg@hachyderm.io
2022-11-30

Let's Encrypt's parent organization, the Internet Security Research Group #ISRG, also released our Annual Report today! Take a look at all the work we've been up to, and what we're hoping to do in the coming year:

abetterinternet.org/documents/

#GivingTuesday #WebPKI

Aaron Gableasg@hachyderm.io
2022-11-28

And Eric Rescorla (CTO of Firefox) just published this fantastic writeup about #eIDAS, the EU's attempt to legislate that browsers *must* trust certain root certificates that issue #QWAC certs, a specific kind of EV cert. It also starts with a great overview of the whole #WebPKI system, in order to set up the argument that eIDAS is Bad for the Internet.

educatedguesswork.org/posts/ei

It goes on to propose alternate designs that achieve the EU's goals without compromising trust. Well worth a read!

Client Info

Server: https://mastodon.social
Version: 2025.04
Repository: https://github.com/cyevgeniy/lmst