<rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Hacker News: mmalone</title><link>https://news.ycombinator.com/user?id=mmalone</link><description>Hacker News RSS</description><docs>https://hnrss.org/</docs><generator>hnrss v2.1.1</generator><lastBuildDate>Sat, 25 Apr 2026 16:24:12 +0000</lastBuildDate><atom:link href="https://hnrss.org/user?id=mmalone" rel="self" type="application/rss+xml"></atom:link><item><title><![CDATA[New comment by mmalone in "WPA3 Enterprise 192-bit mode at home"]]></title><description><![CDATA[
<p>Just to clarify, are you describing EAP-PEAP or EAP-TTLS wrapping PEAP? I'm still learning a lot of this stuff... but, my understanding is that PEAP doesn't do TLS but TTLS + PEAP does. Right?<p>Fact remains, though, that users will probably bypass any certificate warnings (if allowed) and send their passwords to rogue APs. EAP-TLS mitigates this. Definitely pros & cons, but that's a clear win for EAP-TLS.<p>There are a lot of things that'd be nice to see in Wifi. Binding the SSID is an interesting one, though I suspect the folks working on this stuff were reluctant to rely on (and trust) the Web PKI CAs. If you're gonna push your own root cert, you might as well push a RADIUS SAN along with it, I guess.</p>
]]></description><pubDate>Fri, 05 Jan 2024 22:59:47 +0000</pubDate><link>https://news.ycombinator.com/item?id=38886230</link><dc:creator>mmalone</dc:creator><comments>https://news.ycombinator.com/item?id=38886230</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=38886230</guid></item><item><title><![CDATA[New comment by mmalone in "WPA3 Enterprise 192-bit mode at home"]]></title><description><![CDATA[
<p>You can roll your own with <a href="https://github.com/smallstep/certificates">https://github.com/smallstep/certificates</a>. We maintain major open source projects and contribute a lot to other projects. I don’t think that means everything we do has to be open source. Sorry this one wasn’t. Doing this in pure open source would be a book, not a blog post.<p>Love Let’s Encrypt — we’re sponsors — but using them for WiFi is a terrible idea. You need internal PKI for WiFi.</p>
]]></description><pubDate>Fri, 05 Jan 2024 05:51:04 +0000</pubDate><link>https://news.ycombinator.com/item?id=38876137</link><dc:creator>mmalone</dc:creator><comments>https://news.ycombinator.com/item?id=38876137</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=38876137</guid></item><item><title><![CDATA[New comment by mmalone in "WPA3 Enterprise 192-bit mode at home"]]></title><description><![CDATA[
<p>Correct.</p>
]]></description><pubDate>Fri, 05 Jan 2024 05:44:06 +0000</pubDate><link>https://news.ycombinator.com/item?id=38876105</link><dc:creator>mmalone</dc:creator><comments>https://news.ycombinator.com/item?id=38876105</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=38876105</guid></item><item><title><![CDATA[New comment by mmalone in "WPA3 Enterprise 192-bit mode at home"]]></title><description><![CDATA[
<p>Well... the title is hyperbolic (as titles are wont to be), but the goal was to configure Wifi that aligns with the CNSA Suite[1] / CNSSP 15[2], which I think is fair to call "NSA-grade" since they wrote the standard.<p>If the NSA wants to get a certificate that your system trusts there are already dozens of organizations with root certs in your system trust store that they can strongarm. Most organizations can't afford to have the NSA in their threat model. You better not be using public clouds, GSuite, Okta, Azure AD/Entra, etc. This is a difficult security posture to maintain, especially at scale.<p>For most organizations, delegating the operation of sensitive security infrastructure to a third party results in better security, not worse. Yes, you're trusting a third party. But you're also outsourcing sensitive security operations to experts.<p>And, we also have on-prem and open source if you really need something air-gapped ;)<p>[1] <a href="https://en.wikipedia.org/wiki/Commercial_National_Security_Algorithm_Suite" rel="nofollow">https://en.wikipedia.org/wiki/Commercial_National_Security_A...</a>
[2] <a href="https://www.cnss.gov/CNSS/issuances/Policies.cfm" rel="nofollow">https://www.cnss.gov/CNSS/issuances/Policies.cfm</a></p>
]]></description><pubDate>Fri, 05 Jan 2024 02:58:48 +0000</pubDate><link>https://news.ycombinator.com/item?id=38875191</link><dc:creator>mmalone</dc:creator><comments>https://news.ycombinator.com/item?id=38875191</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=38875191</guid></item><item><title><![CDATA[New comment by mmalone in "WPA3 Enterprise 192-bit mode at home"]]></title><description><![CDATA[
<p>I work at smallstep.<p>For home wifi this is totally overkill. Better security is always nice but, in this case, there's a significant usability & interop tradeoff for home use (though that may change over time... we'll see).<p>For business / enterprise settings, this has real value. Distributing a password to everyone doesn't scale and alternative EAP methods have huge security problems. For managed devices, certs can be pushed and EAP-TLS can be configured easily. And it's all seamless for end users[1].<p>For example, EAP-TLS mitigates "evil twin" attacks, where a rogue access point broadcasts your SSID. If you're using something like EAP-PEAP, which is password based, the user is sending a password to the RADIUS server. If they connect to a rogue AP, they just sent their password to the bad guy. If the password is their LDAP/AD/Okta password, that could be very bad.<p>There are a variety of mitigations for this sort of attack but, without getting into details, EAP-TLS is widely considered the most secure option. So, yea, if you're relying exclusively on wifi for security you're doing it wrong. But that doesn't mean you don't need to secure your wifi.<p>[1] <a href="https://www.youtube.com/watch?v=KSL_Ke7HcpU" rel="nofollow">https://www.youtube.com/watch?v=KSL_Ke7HcpU</a></p>
]]></description><pubDate>Fri, 05 Jan 2024 01:51:34 +0000</pubDate><link>https://news.ycombinator.com/item?id=38874765</link><dc:creator>mmalone</dc:creator><comments>https://news.ycombinator.com/item?id=38874765</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=38874765</guid></item><item><title><![CDATA[New comment by mmalone in "WPA3 Enterprise 192-bit mode at home"]]></title><description><![CDATA[
<p>I work at smallstep. Yes. This also works with FreeRadius! We decided to integrate RADIUS into our product since setting up FreeRadius is complicated and, if you're just doing EAP-TLS for Wifi, you don't need all of the features. You don't need to use our hosted RADIUS though.</p>
]]></description><pubDate>Fri, 05 Jan 2024 01:30:44 +0000</pubDate><link>https://news.ycombinator.com/item?id=38874619</link><dc:creator>mmalone</dc:creator><comments>https://news.ycombinator.com/item?id=38874619</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=38874619</guid></item><item><title><![CDATA[New comment by mmalone in "WPA3 Enterprise 192-bit mode at home"]]></title><description><![CDATA[
<p>I work at Smallstep.<p>In this case you're getting an industrial-grade CA with a properly managed private key, etc. Still, fair. We usually include warnings about this, but looks like we forgot this time. Curse of knowledge. I'll see about getting a warning on there asap.</p>
]]></description><pubDate>Fri, 05 Jan 2024 01:27:44 +0000</pubDate><link>https://news.ycombinator.com/item?id=38874595</link><dc:creator>mmalone</dc:creator><comments>https://news.ycombinator.com/item?id=38874595</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=38874595</guid></item><item><title><![CDATA[New comment by mmalone in "WPA3 Enterprise 192-bit mode at home"]]></title><description><![CDATA[
<p>I work at smallstep.<p>Not sure about the RADIUS server, but connections to the CA use TLS for SCEP and/or ACME DA so the CA root cert needs to be trusted for TLS. There may be some way to configure more narrow trust for <i>just</i> this one interaction, but I'm not aware of any such mechanism in the current releases of macOS/iOS/iPadOS/tvOS.</p>
]]></description><pubDate>Fri, 05 Jan 2024 01:18:22 +0000</pubDate><link>https://news.ycombinator.com/item?id=38874537</link><dc:creator>mmalone</dc:creator><comments>https://news.ycombinator.com/item?id=38874537</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=38874537</guid></item><item><title><![CDATA[New comment by mmalone in "WPA3 Enterprise 192-bit mode at home"]]></title><description><![CDATA[
<p>> For the use case cited -- blocking MAC spoofing, EAP-TLS doesn't quite solve it<p>The idea would be to rely on the client certificate authentication and not use MAC filtering at all. For example, you could have an EAP-TLS network that's unrestricted and not let Mallory on it. Or you could use RADIUS reply attributes to put Mallory on a restricted vlan.</p>
]]></description><pubDate>Fri, 05 Jan 2024 01:05:40 +0000</pubDate><link>https://news.ycombinator.com/item?id=38874436</link><dc:creator>mmalone</dc:creator><comments>https://news.ycombinator.com/item?id=38874436</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=38874436</guid></item><item><title><![CDATA[New comment by mmalone in "WPA3 Enterprise 192-bit mode at home"]]></title><description><![CDATA[
<p>If you're doing EAP-TLS wouldn't the ARP attack you're describing fail at the client when it's unable to verify the RADIUS server's certificate?</p>
]]></description><pubDate>Fri, 05 Jan 2024 01:02:17 +0000</pubDate><link>https://news.ycombinator.com/item?id=38874410</link><dc:creator>mmalone</dc:creator><comments>https://news.ycombinator.com/item?id=38874410</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=38874410</guid></item><item><title><![CDATA[New comment by mmalone in "WPA3 Enterprise 192-bit mode at home"]]></title><description><![CDATA[
<p>What would happen if you tried to reconnect to the network and the AP didn't have the pre-shared key? Presumably, you'd prompt the user and ask them if they want to connect. This is the same pattern as trust-on-first-use (TOFU) for SSH, except for non-expert users. It's a good thought but I think it'd fall apart in practice. You'd still be vulnerable to phishing / evil twin APs.</p>
]]></description><pubDate>Fri, 05 Jan 2024 00:57:01 +0000</pubDate><link>https://news.ycombinator.com/item?id=38874370</link><dc:creator>mmalone</dc:creator><comments>https://news.ycombinator.com/item?id=38874370</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=38874370</guid></item><item><title><![CDATA[New comment by mmalone in "If OpenSSL were a GUI"]]></title><description><![CDATA[
<p>It's a critique of OpenSSL, which also makes no attempt to think of user experience.</p>
]]></description><pubDate>Fri, 10 Jun 2022 21:09:38 +0000</pubDate><link>https://news.ycombinator.com/item?id=31699401</link><dc:creator>mmalone</dc:creator><comments>https://news.ycombinator.com/item?id=31699401</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=31699401</guid></item><item><title><![CDATA[New comment by mmalone in "Should you use Let's Encrypt for internal hostnames?"]]></title><description><![CDATA[
<p>This is not a technical limitation though. It's a policy limitation.<p>In theory, a name-constrained intermediate for `.example.com` has no more authority and poses no greater risk than a wildcard leaf certificate for `.example.com`. In both cases the private key can be used to authenticate as any subdomain of `example.com`.<p>But, name constraints are verified by relying parties (the clients and servers that are actually authenticating remote peers using certificates). It's hard to be certain that everything has implemented name constraints properly. This is, ostensibly and as far as I know, the reason CA/Browser forum hasn't allowed name constrained intermediates.<p>At some point it probably makes sense to just pull the bandaid off.</p>
]]></description><pubDate>Thu, 06 Jan 2022 00:20:26 +0000</pubDate><link>https://news.ycombinator.com/item?id=29817305</link><dc:creator>mmalone</dc:creator><comments>https://news.ycombinator.com/item?id=29817305</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=29817305</guid></item><item><title><![CDATA[New comment by mmalone in "Should you use Let's Encrypt for internal hostnames?"]]></title><description><![CDATA[
<p>I'm biased because I'm the founder of the company, but you should check out the certificate management toolchain (CA[1] and CLI[2]) we've built at smallstep. A big focus of the project is human-friendliness. It's not perfect (yet) but I think we've made some good progress.<p>We also have a hosted option[3] with a free tier that should work for individuals, homelabs, pre-production, and even small production environments. We've started building out a management UI there, and it does map to the CLI as you've described :).<p>[1] <a href="https://github.com/smallstep/certificates" rel="nofollow">https://github.com/smallstep/certificates</a><p>[2] <a href="https://github.com/smallstep/cli" rel="nofollow">https://github.com/smallstep/cli</a><p>[3] <a href="https://smallstep.com/certificate-manager/" rel="nofollow">https://smallstep.com/certificate-manager/</a></p>
]]></description><pubDate>Thu, 06 Jan 2022 00:12:01 +0000</pubDate><link>https://news.ycombinator.com/item?id=29817214</link><dc:creator>mmalone</dc:creator><comments>https://news.ycombinator.com/item?id=29817214</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=29817214</guid></item><item><title><![CDATA[New comment by mmalone in "Should you use Let's Encrypt for internal hostnames?"]]></title><description><![CDATA[
<p>You can put "name constraints" on an intermediate that, in theory, can restrict the intermediate to only signing certs for a particular subdomain. In theory, name-constrained intermediate certificate for `<i>.example.com` would have no more authority than a wildcard certificate for `</i>.example.com`.<p>But, name constraints are enforced by "relying parties" -- HTTPS/TLS clients & servers that are validating certificates and authenticating remote peers. In practice, there's a risk that a broken/misconfigured relying party would trust a cert for google.com signed by an intermediate that's name constrained / only trusted to issue for `*.example.com`.</p>
]]></description><pubDate>Wed, 05 Jan 2022 22:31:22 +0000</pubDate><link>https://news.ycombinator.com/item?id=29816034</link><dc:creator>mmalone</dc:creator><comments>https://news.ycombinator.com/item?id=29816034</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=29816034</guid></item><item><title><![CDATA[New comment by mmalone in "Build a tiny certificate authority for your homelab"]]></title><description><![CDATA[
<p>Also, the Web PKI model has no real granular authorization when it comes to which CA can issue for which domain. A trusted CA can issue for any domain. So if you TOFU in my CA to connect to my website you’re also allowing me to issue for google.com.<p>Obviously this is all addressable in theory, but now you’d need some kinda policy system baked in pretty much everywhere.</p>
]]></description><pubDate>Thu, 24 Dec 2020 04:32:47 +0000</pubDate><link>https://news.ycombinator.com/item?id=25525079</link><dc:creator>mmalone</dc:creator><comments>https://news.ycombinator.com/item?id=25525079</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=25525079</guid></item><item><title><![CDATA[New comment by mmalone in "Build a tiny certificate authority for your homelab"]]></title><description><![CDATA[
<p>Good question. I know you can add a root CA cert.<p>I’m on iOS and don’t have an Android or ChromeOS device handy. I don’t see a way to remove a cert from Apple’s iOS trust store (settings just tells me what store version I’m running). There may be a way to do it using mobile device management (MDM) tools.</p>
]]></description><pubDate>Thu, 24 Dec 2020 03:00:09 +0000</pubDate><link>https://news.ycombinator.com/item?id=25524682</link><dc:creator>mmalone</dc:creator><comments>https://news.ycombinator.com/item?id=25524682</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=25524682</guid></item><item><title><![CDATA[New comment by mmalone in "Build a tiny certificate authority for your homelab"]]></title><description><![CDATA[
<p>That is correct.</p>
]]></description><pubDate>Thu, 24 Dec 2020 02:41:43 +0000</pubDate><link>https://news.ycombinator.com/item?id=25524585</link><dc:creator>mmalone</dc:creator><comments>https://news.ycombinator.com/item?id=25524585</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=25524585</guid></item><item><title><![CDATA[New comment by mmalone in "Build a tiny certificate authority for your homelab"]]></title><description><![CDATA[
<p>Yea you’re correct. They were forcing people to add a CA. So this was not a great example.<p>I wouldn’t say the centralization of Web PKI is by design so much as it is (was?) by necessity. There’s a crypto conjecture called Zooko’s Triangle that says there are three desirable properties for a naming system: human-meaningful, secure, and decentralized. Zooko’s conjecture is that you can only have two. Web PKI picks secure & human-meaningful. Simple PKI (like TOFU) picks secure & decentralized (the names aren’t actually human-meaningful since you’re really trusting a public key which is a big random number, not a domain name). DNS picks human-meaningful and decentralized.<p>More recently, Aaron Schwartz realized you can “square the triangle” using blockchain. So it appears to be technically possible to have all three now, but there are other hurdles. In any case, simple public keys aren’t a silver bullet. Just a different set of compromises.</p>
]]></description><pubDate>Thu, 24 Dec 2020 02:40:30 +0000</pubDate><link>https://news.ycombinator.com/item?id=25524577</link><dc:creator>mmalone</dc:creator><comments>https://news.ycombinator.com/item?id=25524577</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=25524577</guid></item><item><title><![CDATA[New comment by mmalone in "Build a tiny certificate authority for your homelab"]]></title><description><![CDATA[
<p>Neat. I had never heard of TLSA.<p>I’ll also add that certificate transparency (CT) is another mechanism designed to mitigate malicious cert issuance by a CA. A CT log is an public, append-only data structure. It doesn’t actively prevent anything, but it does ensure that a malicious issuance is easily detectable. In practice it seems to be a pretty effective deterrent against nation-state attacks: they won’t go undetected for long.</p>
]]></description><pubDate>Thu, 24 Dec 2020 02:27:35 +0000</pubDate><link>https://news.ycombinator.com/item?id=25524531</link><dc:creator>mmalone</dc:creator><comments>https://news.ycombinator.com/item?id=25524531</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=25524531</guid></item></channel></rss>