←back to thread

341 points hlandau | 3 comments | | HN request time: 0s | source
Show context
tedunangst ◴[] No.37962435[source]
Run your own CA and choose your roots carefully didn't make the cut.
replies(1): >>37962872 #
1. fanf2 ◴[] No.37962872[source]
A bit difficult when providing services to third parties who can use any client software :-/
replies(2): >>37963028 #>>37963056 #
2. tedunangst ◴[] No.37963028[source]
That's actually probably easier than getting a browser to work with a forbidden cert, how dare you.
3. justsomehnguy ◴[] No.37963056[source]
Yes, but if you can serve multiple certificates on one endpoint (think SNI) then you can add your own self-signed or private PKI certificate to be able to check if all your requests are being intercepted by a lazy adversary.