Most active commenters

    ←back to thread

    Stop Breaking TLS

    (www.markround.com)
    170 points todsacerdoti | 17 comments | | HN request time: 0.63s | source | bottom
    1. gschizas ◴[] No.46215801[source]
    The fact that most tools have completely different ways to allow them to add certificates is the biggest pain. Git, Python and Rust also have large issues. Git doesn't default to "http.schannel". Python (or rather requests, or maybe urllib3) only looks at its own certificate store, and I have no idea how Rust does this (well, I use uv, and it has its own problems - I know about the --use-native-tls flag, but it should be a default at the least).
    replies(5): >>46215828 #>>46215876 #>>46216017 #>>46216074 #>>46216859 #
    2. nikanj ◴[] No.46215828[source]
    And many things break in different, exciting ways. For example, we discovered that whilst the JVM can be configured to use system certificate store, that does not apply to websocket connections. So the product seems to be able to connect to the server, but all socket connections bork out with TLS errors.

    Fun!

    And so many of those products deliver broken chains, and your client needs to download more certificates transparently ( https://systemweakness.com/the-hidden-jvm-flag-that-instantl... )

    Double the fun!

    3. sureglymop ◴[] No.46215876[source]
    I have this similar gripe when it comes to http proxy configuration. It's invisible to you until you are in an execution environment where you are mandated to use the providers proxy configuration.

    Some software reads "expected" env variables for it, some has its own config or cli flags, most just doesn't even bother/care about supporting it.

    replies(1): >>46216018 #
    4. noroot ◴[] No.46216017[source]
    It's such a nightmare at my current job as well. Everything always just breaks and needs investigating how to fix.

    Even putting aside the MITM and how horrendous that is, the amount of time lost from people dealing with the fallout got to have cost so much time (and money). I can't fathom why anyone competent would want to implement this, let alone not see how much friction and safety issues it causes everywhere.

    replies(1): >>46216091 #
    5. amiga386 ◴[] No.46216018[source]
    Chiefly because "supporting it" requires a full JavaScript interpreter, and subscribing to changes in "system settings" during the lifetime of your program. Easier just to support http_proxy/https_proxy/no_proxy (and what standard for no_proxy? Does it support CIDR ranges?) or even less flexibility than that.
    replies(1): >>46226135 #
    6. dcminter ◴[] No.46216074[source]
    Yeah, and Java has its nice cacerts file so that should have been easy, but then we were using Bazel which does the "hermetic builds" thing so that had to be told about it separately, and on and on with all the other special-snowflake tools.

    It added huge amounts of friction which was one reason I decided to move on from that gig.

    7. dcminter ◴[] No.46216091[source]
    > I can't fathom why anyone competent would want to implement this

    Compliance. Big financial orgs. and the like must show that they are doing something about "data loss" and this, sadly, is the easiest way to do that.

    There's money in it if you can show them a better way.

    replies(3): >>46228079 #>>46228215 #>>46229691 #
    8. jeroenhd ◴[] No.46216859[source]
    On Android, macOS/iOS, and Windows, this is a solved problem. Only on the extremely fragmented Linux/Posix runtimes do these problems surface.

    Rust's solution is "it depends". You can use OpenSSL (system or statically compiled) or rustls (statically compiled with your own CA roots, system CA roots, or WebPKI CA roots).

    I'm afraid that until the *ix operating systems come out with a new POSIX-like definition that stabilises a TLS API, regardless of whether that's the OpenSSL API, the WolfSSL API, or GnuTLS, we'll have to keep hacking around in APIs that need to be compatible with arbitrary TLS configurations. Alternatively, running applications through Waydroid/Wine will work just fine if Linux runtimes can't get their shit together.

    replies(4): >>46217672 #>>46222473 #>>46225695 #>>46229747 #
    9. dmm ◴[] No.46217672[source]
    > Windows, this is a solved problem.

    Are you sure? It's been a few years, but last I tried Firefox used its own CA store on Windows. I'm pretty sure openjdk uses "<JAVA_HOME>/jre/lib/security/cacerts" instead of the system store too.

    10. dingaling ◴[] No.46222473[source]
    I absolutely do not want to be constrained to a single system cert store controlled by the OS vendor.
    replies(1): >>46227579 #
    11. arianvanp ◴[] No.46225695[source]
    Is it solved in macOS? Curl recently removed macOS keychain support as there are like 7 competing APIs 6 of which are deprecated and number 6 is a complete HTTP replacement so curl can't use it.

    Only reason why it works on macOS curl is because they're a few versions behind

    12. sureglymop ◴[] No.46226135{3}[source]
    If only http_proxy/https_proxy/no_proxy at startup time were more widely supported then. In my case I had to deploy software into a kubernetes cluster managed by a different company that required these configurations.
    13. xp84 ◴[] No.46227579{3}[source]
    That last part does sound like a bad deal based on recent anti-owner-control habits like sealed immutable system volumes, but I definitely want to be constrained to a single system cert store controlled by the owner of a computer. Which works for the corporate case as well as the personal one.
    14. musicale ◴[] No.46228079{3}[source]
    > Compliance

    With anti-security policies that: break TLS, thwart certificate pinning, encourage users to ignore certificate errors, expand the attack surface, increase data leak risks, etc. All while wasting resources and money.

    Zscaler and its ilk have conned the IT world. Much like Crowdstrike did before it broke the airlines.

    Not to mention:

    > We only use data or metadata that does not contain customer or personal data for AI model training.

    How reassuring.

    https://www.zscaler.com/blogs/company-news/zscalers-commitme...

    15. ◴[] No.46228215{3}[source]
    16. crote ◴[] No.46229691{3}[source]
    Big emphasis on the "show you're doing something" part: actually being effective isn't a requirement.
    17. crote ◴[] No.46229747[source]
    > On Android, macOS/iOS, and Windows, this is a solved problem.

    Is it, though? It is absolutely trivial for an Android app (like the one you use for banking) to pin a specific CA or even a specific server certificate, and as far as I'm aware it is pretty much impossible to universally override this.

    In fact, by default Android apps don't accept any user-installed certs. It uses separate stores for system-installed CA roots and user-installed CA roots, and since Android 7.0 the default is to only include the system-installed store. Apps have to explicitly opt-in to trusting the user-installed store.