<rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Hacker News: dextercd</title><link>https://news.ycombinator.com/user?id=dextercd</link><description>Hacker News RSS</description><docs>https://hnrss.org/</docs><generator>hnrss v2.1.1</generator><lastBuildDate>Fri, 17 Apr 2026 01:18:34 +0000</lastBuildDate><atom:link href="https://hnrss.org/user?id=dextercd" rel="self" type="application/rss+xml"></atom:link><item><title><![CDATA[New comment by dextercd in "DNS-Persist-01: A New Model for DNS-Based Challenge Validation"]]></title><description><![CDATA[
<p>Your comment is 100% correct, but I just want to point out that this doesn't negate the risks of bob's approach here.<p>LE wouldn't see this as a legitimate reason to raise rate limits, and such a request takes weeks to handle anyway.<p>Indeed, some rate limits don't apply for renewals but some still do.</p>
]]></description><pubDate>Wed, 18 Feb 2026 23:17:39 +0000</pubDate><link>https://news.ycombinator.com/item?id=47067745</link><dc:creator>dextercd</dc:creator><comments>https://news.ycombinator.com/item?id=47067745</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47067745</guid></item><item><title><![CDATA[New comment by dextercd in "DNS-Persist-01: A New Model for DNS-Based Challenge Validation"]]></title><description><![CDATA[
<p>An account needs to be created before you can request a certificate. Some ACME clients might create the account for you implicitly when you request the first certificate, but in the background it still needs to start by registering an account.<p>`certbot register` followed by `certbot show_account` is how you'd do this with certbot.</p>
]]></description><pubDate>Wed, 18 Feb 2026 21:09:03 +0000</pubDate><link>https://news.ycombinator.com/item?id=47066426</link><dc:creator>dextercd</dc:creator><comments>https://news.ycombinator.com/item?id=47066426</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47066426</guid></item><item><title><![CDATA[New comment by dextercd in "DNS-Persist-01: A New Model for DNS-Based Challenge Validation"]]></title><description><![CDATA[
<p>This adds a new validation method that people can use if they want. The existing validation methods (<a href="https://letsencrypt.org/docs/challenge-types/" rel="nofollow">https://letsencrypt.org/docs/challenge-types/</a>) aren't going away, so your current setup will keep working.</p>
]]></description><pubDate>Wed, 18 Feb 2026 20:14:48 +0000</pubDate><link>https://news.ycombinator.com/item?id=47065763</link><dc:creator>dextercd</dc:creator><comments>https://news.ycombinator.com/item?id=47065763</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47065763</guid></item><item><title><![CDATA[New comment by dextercd in "6-Day and IP Address Certificates Are Generally Available"]]></title><description><![CDATA[
<p>The server that wants to authenticate clients via mTLS doesn't need the clientAuth EKU on its certificate, only the clients do.<p>Most of the time you set up mTLS by creating your own self-signed certificate and verifying that the client has that cert (or one that chains up to it). I'm wondering what systems exist that need a publicly trusted cert with clientAuth.<p>Only think I've heard of so far is XMPP for server-to-server auth, but there are alternative auth methods it supports.</p>
]]></description><pubDate>Mon, 19 Jan 2026 23:10:34 +0000</pubDate><link>https://news.ycombinator.com/item?id=46685865</link><dc:creator>dextercd</dc:creator><comments>https://news.ycombinator.com/item?id=46685865</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=46685865</guid></item><item><title><![CDATA[New comment by dextercd in "6-Day and IP Address Certificates Are Generally Available"]]></title><description><![CDATA[
<p>Thanks for chiming in! I remember now that you also said this on the LE community forum.<p>Right, that explains it. So the use would be for things other than websites or for websites that don't need to support Chrome (and also need clientAuth)?<p>I guess I find it hard to wrap my head around this because I don't have experience with any applications where this plus a publicly trusted certificate makes sense. But I suppose they must exist, otherwise there would've been an effort to vote it into the BRs.<p>If you or someone else here knows more about these use cases, then I'd like to hear about it to better understand this.</p>
]]></description><pubDate>Sat, 17 Jan 2026 02:39:32 +0000</pubDate><link>https://news.ycombinator.com/item?id=46654775</link><dc:creator>dextercd</dc:creator><comments>https://news.ycombinator.com/item?id=46654775</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=46654775</guid></item><item><title><![CDATA[New comment by dextercd in "6-Day and IP Address Certificates Are Generally Available"]]></title><description><![CDATA[
<p>All major root store programs (Chrome, Apple, Microsoft, Mozilla) have this power. They set the requirements that CAs must follow to be included in their root store, and for most CAs their certs would be useless if they aren't included in all major ones.<p>I don't think the root programs take these kind of decisions lightly and I don't see any selfish motives they could have. They need to find a balance between not overcomplicating things for site operators and CAs (they must stay reliable) while also keeping end users secure.<p>A lot of CAs and site operators would love if nothing ever changed: don't disallow insecure signature/hash algorithms, 5+ year valid certs, renewals done manually, no CT, no MPIC, etc. So someone else needs to push for these improvements.<p>The changes the root programs push for aren't unreasonable, so I'm not really concerned about the power they have over CAs.<p>That doesn't mean the changes aren't painful in the short term. For example, the move to 45 day certificates is going to cause some downtime, but of course the root programs/browsers don't benefit from that. They're still doing this because they believe that in the long term it's going to make WebPKI more robust.<p>There's also the CA/Browser Forum where rule changes are discussed and voted on. I'm not sure how root programs decide on what to make part of their root policy vs. what to try to get voted into the baseline requirements. Perhaps in this case Chrome felt that too many CAs would vote against for self-interested reasons, but that's speculation.</p>
]]></description><pubDate>Sat, 17 Jan 2026 01:21:32 +0000</pubDate><link>https://news.ycombinator.com/item?id=46654381</link><dc:creator>dextercd</dc:creator><comments>https://news.ycombinator.com/item?id=46654381</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=46654381</guid></item><item><title><![CDATA[New comment by dextercd in "6-Day and IP Address Certificates Are Generally Available"]]></title><description><![CDATA[
<p>It's a requirement from the Chrome root program. This page is probably the best resource on why they want this: <a href="https://googlechrome.github.io/chromerootprogram/moving-forward-together/#phase-out-multi-purpose-roots-from-the-chrome-root-store" rel="nofollow">https://googlechrome.github.io/chromerootprogram/moving-forw...</a></p>
]]></description><pubDate>Fri, 16 Jan 2026 18:44:17 +0000</pubDate><link>https://news.ycombinator.com/item?id=46650240</link><dc:creator>dextercd</dc:creator><comments>https://news.ycombinator.com/item?id=46650240</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=46650240</guid></item><item><title><![CDATA[New comment by dextercd in "Where Does Cloudflare Think I Am?"]]></title><description><![CDATA[
<p>Interesting!<p>On the Google search results page at the bottom there's a city name + "From your IP address" link. Clicking it shows a map with a circled region. It seems to match with what Google maps opens by default.<p>It's a little less accurate than Cloudflare in my case.</p>
]]></description><pubDate>Sat, 03 Jan 2026 17:11:04 +0000</pubDate><link>https://news.ycombinator.com/item?id=46479026</link><dc:creator>dextercd</dc:creator><comments>https://news.ycombinator.com/item?id=46479026</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=46479026</guid></item><item><title><![CDATA[New comment by dextercd in "Where Does Cloudflare Think I Am?"]]></title><description><![CDATA[
<p>2.33 km off for me. Pretty cool</p>
]]></description><pubDate>Sat, 03 Jan 2026 15:33:58 +0000</pubDate><link>https://news.ycombinator.com/item?id=46477819</link><dc:creator>dextercd</dc:creator><comments>https://news.ycombinator.com/item?id=46477819</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=46477819</guid></item><item><title><![CDATA[New comment by dextercd in "The Dangers of SSL Certificates"]]></title><description><![CDATA[
<p>You need external monitoring of certificate validity. Your ACME client might not be sending failure notifications properly (like happened to Bazel here). The client could also think everything is OK because it acquired a new cert, meanwhile the certificate isn't installed properly (e.g., not reloading a service so it keeps using the old cert).<p>I have a simple Python script that runs every day and checks the certificates of multiple sites.<p>One time this script signaled that a cert was close to expiring even though I saw a newer cert in my browser. It turned out that I had accidentally launched another reverse proxy instance which was stuck on the old cert. Requests were randomly passed to either instance. The script helped me correct this mistake before it caused issues.</p>
]]></description><pubDate>Sun, 28 Dec 2025 00:03:22 +0000</pubDate><link>https://news.ycombinator.com/item?id=46406879</link><dc:creator>dextercd</dc:creator><comments>https://news.ycombinator.com/item?id=46406879</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=46406879</guid></item><item><title><![CDATA[New comment by dextercd in "Systemd can be a cause of restrictions on daemons"]]></title><description><![CDATA[
<p>Here's the Python version I've been using: <a href="https://gist.github.com/dextercd/3bd65c1e32635b9e7bebf287b52cd873" rel="nofollow">https://gist.github.com/dextercd/3bd65c1e32635b9e7bebf287b52...</a><p>Another issue I just ran into is that a colon separated value for ExecSearchPath doesn't work in systemd-run/-p. You have to specify each path as a separate -p argument.<p>There are some minor annoyances like that, but it's not too hard to work around.</p>
]]></description><pubDate>Sun, 21 Sep 2025 01:25:33 +0000</pubDate><link>https://news.ycombinator.com/item?id=45319196</link><dc:creator>dextercd</dc:creator><comments>https://news.ycombinator.com/item?id=45319196</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=45319196</guid></item><item><title><![CDATA[New comment by dextercd in "Systemd can be a cause of restrictions on daemons"]]></title><description><![CDATA[
<p>You can use systemd-run with --shell (or a subset of options enabled by --shell) and -p to specify service properties to run commands interactively in a similar environment as your service.<p>This can help troubleshoot issues and makes experimenting with systemd options faster.<p>I think there's been some talk about adding a built-in way for systemd-run to copy settings out of a .service file, but it doesn't exist yet.<p>I've written Perl/Python scripts to do this for me. They're not really aimed at working with arbitrary services, but it should be possible to adapt to different scenarios.<p><a href="https://gist.github.com/dextercd/59a7e5e25b125d3506c78caa3dd8dd49" rel="nofollow">https://gist.github.com/dextercd/59a7e5e25b125d3506c78caa3dd...</a><p>There are some gotchas I ran into. For example, with RuntimeDirectory: systemd deletes the directory once the process exits, even if there's still another process running with the same RuntimeDirectory value set.</p>
]]></description><pubDate>Sat, 20 Sep 2025 16:21:15 +0000</pubDate><link>https://news.ycombinator.com/item?id=45314679</link><dc:creator>dextercd</dc:creator><comments>https://news.ycombinator.com/item?id=45314679</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=45314679</guid></item><item><title><![CDATA[New comment by dextercd in "Game launcher installs Root CA certificate on your machine (2024)"]]></title><description><![CDATA[
<p>A code signing certificate does not cost $500 a year. The OP links to an offering by Certum which is just $25 a year plus the cost for a reusable smart card.<p>Personally, I recently acquired a certificate from HARICA which costs $55 a year if you only buy one year at a time.</p>
]]></description><pubDate>Sun, 07 Sep 2025 11:34:09 +0000</pubDate><link>https://news.ycombinator.com/item?id=45157300</link><dc:creator>dextercd</dc:creator><comments>https://news.ycombinator.com/item?id=45157300</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=45157300</guid></item><item><title><![CDATA[New comment by dextercd in "TLS certificate lifetimes will officially reduce to 47 days"]]></title><description><![CDATA[
<p>Apple introduced this proposal. Why would they care about a CA's legal exposure?<p>Lower the lifetime of certs does mean that orgs will be better prepared to replace bad certs when they occur. That's a good thing.<p>More organisations will now take the time to configure ACME clients instead of trying to convince CA's that they're too special to have their certs revoked, or even start embarrassing court cases, which has only happened once as far as I know.<p>Theories that involve CAs, Google, Microsoft, Apple, and Mozilla having ulterior motives and not considering potential downsides of this change are silly.</p>
]]></description><pubDate>Wed, 16 Apr 2025 22:54:25 +0000</pubDate><link>https://news.ycombinator.com/item?id=43711204</link><dc:creator>dextercd</dc:creator><comments>https://news.ycombinator.com/item?id=43711204</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=43711204</guid></item><item><title><![CDATA[New comment by dextercd in "SSL/TLS certificate lifespans reduced to 47 days by 2029"]]></title><description><![CDATA[
<p>Stealing a private key or getting a CA to misissue a certificate is hard. Then actually making use of this in a MITM attack is also difficult.<p>Still, oppressive states or hacked ISPs can perform these attacks on small scales (e.g. individual orgs/households) and go undetected.<p>For a technology the whole world depends on for secure communication, we shouldn't wait until we detect instances of this happening. Taking action to make these attacks harder, more expensive, and shorter lasting is being forward thinking.<p>Certificate transparency and Multi-Perspective Issuance Corroboration are examples of innovations without bothering people.<p>Problem is, the benefits of these improvements are limited if attackers can keep using the stolen keys or misissued certificates for 5 years (plus potentially whatever the DCV reuse limit is).<p>Next time a DigiNotar, Debian weak keys, or heartbleed -like event happens, we'll be glad that these certs exit the ecosystem sooner rather than later.</p>
]]></description><pubDate>Tue, 15 Apr 2025 22:32:11 +0000</pubDate><link>https://news.ycombinator.com/item?id=43699233</link><dc:creator>dextercd</dc:creator><comments>https://news.ycombinator.com/item?id=43699233</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=43699233</guid></item><item><title><![CDATA[New comment by dextercd in "TLS certificate lifetimes will officially reduce to 47 days"]]></title><description><![CDATA[
<p>No idea how many are first-party or vetted by Microsoft. Probably none of them. But I really, really doubt you can <i>only</i> run software that ticks one of those two boxes.<p>Certify The Web has a 'Microsoft Partner' badge. If that's something your org values, then they seem worth looking into for IIS.<p>I can find documentation online from Microsoft where they use YARP w/ LettuceEncrypt, Caddy, and cert-manager. Clearly Microsoft is not afraid to tell customers about how to use third party solutions.<p>Yes, these are not fully endorsed by Microsoft, so it's much harder to get approval for. If an organisation really makes it impossible, then they deserve the consequences of that. They're going to have problems with 397 day certificates as well. That shouldn't hold the rest of the industry back. We'd still be on 5 year certs by that logic.</p>
]]></description><pubDate>Tue, 15 Apr 2025 20:10:34 +0000</pubDate><link>https://news.ycombinator.com/item?id=43697795</link><dc:creator>dextercd</dc:creator><comments>https://news.ycombinator.com/item?id=43697795</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=43697795</guid></item><item><title><![CDATA[New comment by dextercd in "TLS certificate lifetimes will officially reduce to 47 days"]]></title><description><![CDATA[
<p>I learned a lot from TLS Mastery by Michael W. Lucas.</p>
]]></description><pubDate>Tue, 15 Apr 2025 17:53:31 +0000</pubDate><link>https://news.ycombinator.com/item?id=43696233</link><dc:creator>dextercd</dc:creator><comments>https://news.ycombinator.com/item?id=43696233</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=43696233</guid></item><item><title><![CDATA[New comment by dextercd in "TLS certificate lifetimes will officially reduce to 47 days"]]></title><description><![CDATA[
<p>Let's Encrypt lists 10 ACME clients for Windows / IIS.<p>If an organisation ignores all those options, then I suppose they should keep doing it manually. But at the end of the day, that is a choice.<p>Maybe they'll reconsider now that the lifetime is going down or implement their own client if they're that scared of third party code.<p>Yeah, this will inconvenience some of the CA/B participant's customers. They knew that. It'll also make them and everyone else more secure. And that's what won out.<p>The idea that this change got voted in due to incompetence, malice, or lack of oversight from the companies represented on the CA/B forum is ridiculous to me.</p>
]]></description><pubDate>Tue, 15 Apr 2025 17:35:36 +0000</pubDate><link>https://news.ycombinator.com/item?id=43696018</link><dc:creator>dextercd</dc:creator><comments>https://news.ycombinator.com/item?id=43696018</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=43696018</guid></item><item><title><![CDATA[New comment by dextercd in "SSL/TLS certificate lifespans reduced to 47 days by 2029"]]></title><description><![CDATA[
<p>If a CA or subscriber improves their security but had an undetected incident in the past, a hacker today has a 397 day cert and can reuse the domain control validation in the next 397 days, meaning they can MITM traffic for effectively 794 days.<p>CAs have now implemented MPIC. This may have thwarted some attacks, but those attackers still have valid certificates today and can request a new certificate without any domain control validation being performed in over a year.<p>BGP hijackings have been uncovered in the last 5 years and MPIC does make this more difficult. <a href="https://en.wikipedia.org/wiki/BGP_hijacking" rel="nofollow">https://en.wikipedia.org/wiki/BGP_hijacking</a><p>New security standards should come into effect much faster. For fixes against attacks we know about today and new ones that are discovered and mitigated in the future.</p>
]]></description><pubDate>Tue, 15 Apr 2025 17:06:56 +0000</pubDate><link>https://news.ycombinator.com/item?id=43695639</link><dc:creator>dextercd</dc:creator><comments>https://news.ycombinator.com/item?id=43695639</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=43695639</guid></item><item><title><![CDATA[New comment by dextercd in "TLS certificate lifetimes will officially reduce to 47 days"]]></title><description><![CDATA[
<p>I think most orgs can get away with free ACME clients and free/cheap monitoring options.<p>This will be painful for people in the short term, but in the long term I believe it will make things more automated, more secure, and less fragile.<p>Browsers are the ones pushing for this change. They wouldn't do it if they thought it would cause people to see more expired certificate warnings.<p>> Unfortunately the CA/B is essentially unchecked power, no individual corporate member is going to fire their representatives for this, much less is there a way to remove everyone that made this incredibly harmful decision.<p>Representatives are not voting against the wishes/instructions of their employer.</p>
]]></description><pubDate>Tue, 15 Apr 2025 15:57:36 +0000</pubDate><link>https://news.ycombinator.com/item?id=43694712</link><dc:creator>dextercd</dc:creator><comments>https://news.ycombinator.com/item?id=43694712</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=43694712</guid></item></channel></rss>