<rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Hacker News: nickf</title><link>https://news.ycombinator.com/user?id=nickf</link><description>Hacker News RSS</description><docs>https://hnrss.org/</docs><generator>hnrss v2.1.1</generator><lastBuildDate>Fri, 17 Apr 2026 04:24:10 +0000</lastBuildDate><atom:link href="https://hnrss.org/user?id=nickf" rel="self" type="application/rss+xml"></atom:link><item><title><![CDATA[New comment by nickf in "WebPKI and You"]]></title><description><![CDATA[
<p>While I sort-of see what you're trying to say, if you knew the groups and teams involved - you'd know there was no favouritism and a strong degree of separation between CA and root programs.<p>The root programs who have their own CAs are also cloud providers, who arguably have a legitimate need for the CA. Or in Apple's case they have their own CA, but don't issue externally. They keep CA and root program separate.</p>
]]></description><pubDate>Thu, 12 Mar 2026 23:28:09 +0000</pubDate><link>https://news.ycombinator.com/item?id=47358698</link><dc:creator>nickf</dc:creator><comments>https://news.ycombinator.com/item?id=47358698</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47358698</guid></item><item><title><![CDATA[New comment by nickf in "WebPKI and You"]]></title><description><![CDATA[
<p>That's absolutely incorrect. While CABF sets the 'Baseline Requirements' that ultimately go into the WebTrust audit scheme that root programs use to accept roots into their trust stores...browsers can and do set their own rules.<p>The reduction of TLS cert lifetime to a max of 398 days was an Apple policy.</p>
]]></description><pubDate>Thu, 12 Mar 2026 23:25:58 +0000</pubDate><link>https://news.ycombinator.com/item?id=47358679</link><dc:creator>nickf</dc:creator><comments>https://news.ycombinator.com/item?id=47358679</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47358679</guid></item><item><title><![CDATA[New comment by nickf in "Robust and efficient quantum-safe HTTPS"]]></title><description><![CDATA[
<p>Your failure to see the problem doesn’t mean it doesn’t exist. 40x the size might not really be an issue for the hypothetical server you’ve suggested - but that isn’t the reality for the world. Many devices do HTTPS and TLS.
Not to mention the issue is more with the <i>clients</i>.
CT logs would get a lot harder to run (and they’re already not so easy).</p>
]]></description><pubDate>Sun, 01 Mar 2026 20:48:33 +0000</pubDate><link>https://news.ycombinator.com/item?id=47210511</link><dc:creator>nickf</dc:creator><comments>https://news.ycombinator.com/item?id=47210511</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47210511</guid></item><item><title><![CDATA[New comment by nickf in "Upcoming changes to Let's Encrypt and how they affect XMPP server operators"]]></title><description><![CDATA[
<p>Google dominate the space because they have an active, robust trust-store program that they manage well. Apple the same. Mozilla and Microsoft too (though to a lesser extent).<p>If any ecosystem - such as XMPP - wishes to, they could start their own root-program, but many simply copy what Chrome or Mozilla do and then are surprised when things change.</p>
]]></description><pubDate>Tue, 10 Feb 2026 15:45:57 +0000</pubDate><link>https://news.ycombinator.com/item?id=46961362</link><dc:creator>nickf</dc:creator><comments>https://news.ycombinator.com/item?id=46961362</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=46961362</guid></item><item><title><![CDATA[New comment by nickf in "Upcoming changes to Let's Encrypt and how they affect XMPP server operators"]]></title><description><![CDATA[
<p>Not really, no. There are a number of reasons for cert lifetimes being made shorter.</p>
]]></description><pubDate>Tue, 10 Feb 2026 12:43:57 +0000</pubDate><link>https://news.ycombinator.com/item?id=46958980</link><dc:creator>nickf</dc:creator><comments>https://news.ycombinator.com/item?id=46958980</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=46958980</guid></item><item><title><![CDATA[New comment by nickf in "Upcoming changes to Let's Encrypt and how they affect XMPP server operators"]]></title><description><![CDATA[
<p>A public CA checks it one-time, when it's being issued. 
Most/all mTLS use-cases don't do any checking of the client cert in any capacity. Worse still, some APIs (mainly for finance companies) require things like OV and EV, but of course they couldn't check the Subject DN if they wanted to.<p>If it's for auth, issue it yourself and don't rely on a third-party like a public CA.</p>
]]></description><pubDate>Mon, 09 Feb 2026 23:14:05 +0000</pubDate><link>https://news.ycombinator.com/item?id=46952944</link><dc:creator>nickf</dc:creator><comments>https://news.ycombinator.com/item?id=46952944</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=46952944</guid></item><item><title><![CDATA[New comment by nickf in "Upcoming changes to Let's Encrypt and how they affect XMPP server operators"]]></title><description><![CDATA[
<p>Eh, it's pretty easy to impersonate if the values in the certificate aren't checked, and you could get one from any of a list of public CAs.<p>If you're relying on a certificate for authentication - issue it yourself.</p>
]]></description><pubDate>Mon, 09 Feb 2026 22:54:51 +0000</pubDate><link>https://news.ycombinator.com/item?id=46952741</link><dc:creator>nickf</dc:creator><comments>https://news.ycombinator.com/item?id=46952741</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=46952741</guid></item><item><title><![CDATA[New comment by nickf in "Upcoming changes to Let's Encrypt and how they affect XMPP server operators"]]></title><description><![CDATA[
<p>Publicly-trusted client authentication does nothing. It's not a thing that should exist, or is needed.</p>
]]></description><pubDate>Mon, 09 Feb 2026 22:45:46 +0000</pubDate><link>https://news.ycombinator.com/item?id=46952659</link><dc:creator>nickf</dc:creator><comments>https://news.ycombinator.com/item?id=46952659</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=46952659</guid></item><item><title><![CDATA[New comment by nickf in "Upcoming changes to Let's Encrypt and how they affect XMPP server operators"]]></title><description><![CDATA[
<p>Client authentication with publicly-trusted (i.e. chaining to roots in one of the major 4 or 5 trust-store programs) is bad. It doesn't actually authenticate anything at all, and never has.<p>No-one that uses it is authenticating anything more than the other party has an internet connection and the ability, perhaps, to read.
No part of the Subject DN or SAN is checked. It's just that it's 'easy' to rely on an existing trust-store rather than implement something secure using private PKI.<p>Some providers who 'require' public TLS certs for mTLS even specify specific products and CAs (OV, EV from specific CAs) not realising that both the CAs and the roots are going to rotate more frequently in future.</p>
]]></description><pubDate>Mon, 09 Feb 2026 22:44:38 +0000</pubDate><link>https://news.ycombinator.com/item?id=46952644</link><dc:creator>nickf</dc:creator><comments>https://news.ycombinator.com/item?id=46952644</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=46952644</guid></item><item><title><![CDATA[New comment by nickf in "Upcoming changes to Let's Encrypt and how they affect XMPP server operators"]]></title><description><![CDATA[
<p>You are correct, and the answer is - no-one using publicly-trusted TLS certs for client authentication is actually doing any authentication. At best, they're verifying the other party has an internet connection and perhaps the ability to read.<p>It was only ever used because other options are harder to implement.</p>
]]></description><pubDate>Mon, 09 Feb 2026 22:40:57 +0000</pubDate><link>https://news.ycombinator.com/item?id=46952599</link><dc:creator>nickf</dc:creator><comments>https://news.ycombinator.com/item?id=46952599</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=46952599</guid></item><item><title><![CDATA[New comment by nickf in "6-Day and IP Address Certificates Are Generally Available"]]></title><description><![CDATA[
<p>It’ll be 5 years soon.</p>
]]></description><pubDate>Sat, 17 Jan 2026 22:28:26 +0000</pubDate><link>https://news.ycombinator.com/item?id=46662746</link><dc:creator>nickf</dc:creator><comments>https://news.ycombinator.com/item?id=46662746</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=46662746</guid></item><item><title><![CDATA[New comment by nickf in "Mozilla's New CEO Confirms Firefox Will Become an "AI Browser""]]></title><description><![CDATA[
<p>I was mostly just typing out what they had listed under 'products' on their pages. I'm aware of what Mozilla do, know folks there and that have been there. 
They've been roundly criticised for adding 'products' of questionable value to their core userbase, rightly so in my opinion.</p>
]]></description><pubDate>Fri, 19 Dec 2025 09:32:45 +0000</pubDate><link>https://news.ycombinator.com/item?id=46323903</link><dc:creator>nickf</dc:creator><comments>https://news.ycombinator.com/item?id=46323903</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=46323903</guid></item><item><title><![CDATA[New comment by nickf in "Mozilla's New CEO Confirms Firefox Will Become an "AI Browser""]]></title><description><![CDATA[
<p>...which is arguably the problem. Firefox. Thunderbird. That should be it. According to their own site, beyond that they have the browser app for mobile devices. A VPN service, an email-forwarding service, and MDN. Hardly 'many products'.</p>
]]></description><pubDate>Thu, 18 Dec 2025 08:04:33 +0000</pubDate><link>https://news.ycombinator.com/item?id=46310057</link><dc:creator>nickf</dc:creator><comments>https://news.ycombinator.com/item?id=46310057</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=46310057</guid></item><item><title><![CDATA[New comment by nickf in "Upcoming Changes to Let's Encrypt Certificates"]]></title><description><![CDATA[
<p>There are ways to do this as pointed out below - CNAME all your domains to one target domain and make the changes there.
There’s also a new DCV method that only needs a single, static record. Expect CA support widely in the coming weeks and months. That might help?</p>
]]></description><pubDate>Tue, 16 Dec 2025 16:46:57 +0000</pubDate><link>https://news.ycombinator.com/item?id=46290814</link><dc:creator>nickf</dc:creator><comments>https://news.ycombinator.com/item?id=46290814</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=46290814</guid></item><item><title><![CDATA[New comment by nickf in "Upcoming Changes to Let's Encrypt Certificates"]]></title><description><![CDATA[
<p>It might never 'touch' the internet, but the certificates can be easily automated. They don't have to be reachable on the internet, they don't have to have access to modify DNS - but if you want any machine in the world to trust it by default, then yes - there'll need to be some effort to get a certificate there (which is an attestation that you control that FQDN at a point-in-time).</p>
]]></description><pubDate>Tue, 16 Dec 2025 11:35:14 +0000</pubDate><link>https://news.ycombinator.com/item?id=46287360</link><dc:creator>nickf</dc:creator><comments>https://news.ycombinator.com/item?id=46287360</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=46287360</guid></item><item><title><![CDATA[New comment by nickf in "Upcoming Changes to Let's Encrypt Certificates"]]></title><description><![CDATA[
<p>Not quite true - some CAs were not 'held hostage' - some agree with the changes and supported them. See the endorsers for SC-081.</p>
]]></description><pubDate>Tue, 16 Dec 2025 08:56:31 +0000</pubDate><link>https://news.ycombinator.com/item?id=46286299</link><dc:creator>nickf</dc:creator><comments>https://news.ycombinator.com/item?id=46286299</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=46286299</guid></item><item><title><![CDATA[New comment by nickf in "Upcoming Changes to Let's Encrypt Certificates"]]></title><description><![CDATA[
<p>Honestly don't recall discussing 17 days, but I could be wrong.
47 days was a 'compromise' in that it's a step-down over a few years rather than a single big-bang event dropping from 397->90/47/less.</p>
]]></description><pubDate>Tue, 16 Dec 2025 08:50:11 +0000</pubDate><link>https://news.ycombinator.com/item?id=46286256</link><dc:creator>nickf</dc:creator><comments>https://news.ycombinator.com/item?id=46286256</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=46286256</guid></item><item><title><![CDATA[New comment by nickf in "Upcoming Changes to Let's Encrypt Certificates"]]></title><description><![CDATA[
<p>Can I ask - if you're using publicly-trusted TLS server certificates for <i>client</i> authentication...what are you actually authenticating?
Just that someone has a certificate that can be chained back to a trust-anchor in a common trust-store? (ie your authentication is that they have an internet connection and perhaps the ability to read).</p>
]]></description><pubDate>Tue, 16 Dec 2025 08:48:41 +0000</pubDate><link>https://news.ycombinator.com/item?id=46286250</link><dc:creator>nickf</dc:creator><comments>https://news.ycombinator.com/item?id=46286250</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=46286250</guid></item><item><title><![CDATA[New comment by nickf in "Upcoming Changes to Let's Encrypt Certificates"]]></title><description><![CDATA[
<p>Sure, but in those examples - automation and short-lifetime certs are totally possible.</p>
]]></description><pubDate>Tue, 16 Dec 2025 08:38:23 +0000</pubDate><link>https://news.ycombinator.com/item?id=46286183</link><dc:creator>nickf</dc:creator><comments>https://news.ycombinator.com/item?id=46286183</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=46286183</guid></item><item><title><![CDATA[New comment by nickf in "Upcoming Changes to Let's Encrypt Certificates"]]></title><description><![CDATA[
<p>Chrome root policy, and likely other root policies are moving toward 5-years rotation of the roots, and annual rotation of issuing CAs. 
Cross-signing works fine for root rotation in most cases, unless you use IIS, then it becomes a fun problem.</p>
]]></description><pubDate>Mon, 15 Dec 2025 22:54:36 +0000</pubDate><link>https://news.ycombinator.com/item?id=46282014</link><dc:creator>nickf</dc:creator><comments>https://news.ycombinator.com/item?id=46282014</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=46282014</guid></item></channel></rss>