On 2021-08-25, Chris Angelico <ros...@gmail.com> wrote:
> On Thu, Aug 26, 2021 at 12:48 AM Jon Ribbens via Python-list
><python-list@python.org> wrote:
>> Another attempt at combatting this problem is DNS CAA records,
>> which are a way of politely asking all CAs in the world except the
>> ones you choose "please don't issue a certificate for my domain".
>> By definition someone who had hacked a CA would pay no attention
>> to that request, of course.
>
> True, but that would still prevent legit CAs from unwittingly
> contributing to an attack. But it still wouldn't help if someone can
> do any sort of large-scale DNS attack, which is kinda essential for
> most of this to matter anyway (it doesn't matter if an attacker has a
> fake cert if all traffic goes to the legit site anyway).

That depends whether it's a large-scale attack or targeted at some
particular person or organisation, I suppose.

> Earlier I posited a hypothetical approach wherein the server would
> sign a new cert using the old cert, and would then be able to present
> that upon request. Are there any massive glaring problems with that?

That's a very similar idea to HTTP Public Key Pinning, and apparently
there were enough problems with that that they discontinued it.

> But, maybe we're just coming back to "it doesn't matter and nobody
> really cares".

People don't care until something goes wrong, and then suddenly they
care a great deal...
-- 
https://mail.python.org/mailman/listinfo/python-list

Reply via email to