←back to thread

155 points kxxt | 2 comments | | HN request time: 0.653s | source
Show context
gethly ◴[] No.45083427[source]
Because those ephemeral LE certificates are such a great idea...
replies(6): >>45083455 #>>45083516 #>>45083798 #>>45083991 #>>45084464 #>>45088393 #
hkt ◴[] No.45083991[source]
DANE would be better than LE, but weirdly the massive companies building browsers don't want to provide support. Spooky!

https://en.wikipedia.org/wiki/DNS-based_Authentication_of_Na...

replies(2): >>45084450 #>>45084457 #
aaomidi ◴[] No.45084450[source]
You’re just moving your root of trust to DNS then?

With certificates we’re doing multi perspective validation.

DNS root of trust is silly. DNSSEC is not a proper root of trust

replies(1): >>45085033 #
ocdtrekkie ◴[] No.45085033[source]
DNS is already the root of trust, certificates are domain-validated. We currently just depend on both DNS and an unelected group of random companies Google has decided jump through their arbitrary hoops often enough.

If your domain register or DNS provider is compromised in any way, all of the bullcrud the CA/B demands of certificates is entirely meaningless, the bad actor can legitimately request certificates.

replies(1): >>45086328 #
aaomidi ◴[] No.45086328[source]
This is what multi perspective helps with. It doesn’t mitigate every single attack.

But think about what DANE is for a second. If a bad actor is MITMing your connection to some endpoint, they certainly can MITM your DNS queries too.

replies(1): >>45086412 #
1. ocdtrekkie ◴[] No.45086412[source]
Multi-perspective helps prevent MITM, it doesn't provide any better security than your domain and DNS provider's security. It's just another layer to patch over the bad idea of CAs in the first place.
replies(1): >>45090641 #
2. crote ◴[] No.45090641[source]
It's a completely different attack scenario.

DANE isn't going to be of any value when an attacker is sitting between the end user and their ISP - which was already the requirement for compromising the TLS connection in the first place - as they could just strip DNSSEC and fake the DANE records.