<rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Hacker News: sleevi</title><link>https://news.ycombinator.com/user?id=sleevi</link><description>Hacker News RSS</description><docs>https://hnrss.org/</docs><generator>hnrss v2.1.1</generator><lastBuildDate>Thu, 23 Apr 2026 12:09:06 +0000</lastBuildDate><atom:link href="https://hnrss.org/user?id=sleevi" rel="self" type="application/rss+xml"></atom:link><item><title><![CDATA[New comment by sleevi in "Running a Certificate Transparency log"]]></title><description><![CDATA[
<p>All the time. Many CA distrust events involved some degree of “amateurs” reporting issues. While I hesitate to call commenters like agwa an amateur, it certainly was not professionally sponsored work by root programs or CAs. This is a key thing that Certificate Transparency enables: amateurs, academics, and the public at large to report CA issues.<p>At the same time, it sounds like the issues you describe aren’t CA/issuance issues, but rather, simple misconfigurations. Those aren’t incidents for the ecosystem, although definitely can be disruptive to the site, but I also wouldn’t expect them to call trust or identity into disrepute. That’d be like arguing my drivers license is invalid if I handed you my passport; giving you the wrong doc doesn’t invalidate the claims of either, just doesn’t address your need.</p>
]]></description><pubDate>Mon, 07 Jul 2025 21:40:10 +0000</pubDate><link>https://news.ycombinator.com/item?id=44494951</link><dc:creator>sleevi</dc:creator><comments>https://news.ycombinator.com/item?id=44494951</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=44494951</guid></item><item><title><![CDATA[New comment by sleevi in "The browser's biggest TLS mistake"]]></title><description><![CDATA[
<p>Because it wasn’t actually a server misconfiguration, nor was it, as others have speculated, about Postel’s Law.<p>The way X.509 was designed - to the very first version - was the notion that you have your set of CAs you trust, I have my set, and they’re different. Instead of using The Directory to resolve the path from your cert to someone I trust, PKIX (RFC 2459-et-al) defined AIA.<p>So the intent here was that there’s no “one right chain to rule them all”: there’s _your_ chain to your root, _my_ chain to my root, all for the same cert, using cross-certificates.<p>Browsers adopted X.509 before PKIX existed, and they assumed just enough of the model to get things to work. The standards were developed after, and the major vendors didn’t all update their code to match the standards. Microsoft, Sun, and many government focused customers did (and used the NIST PKITS test to prove it), Netscape/later Mozilla and OpenSSL did not: they kept their existing “works for me” implementations.<p><a href="https://medium.com/@sleevi_/path-building-vs-path-verifying-the-chain-of-pain-9fbab861d7d6" rel="nofollow">https://medium.com/@sleevi_/path-building-vs-path-verifying-...</a> Discusses this a bit more. In modern times, the TLS RFCs better reflect that there’s no “one right chain to rule them all”. Even if you or I aren’t running our own roots that we use to cross-sign CAs we trust, we still have different browsers/trust stores taking different paths, and even in the same browser, different versions of the trust store necessitating different intermediates.<p>TLS has no way of negotiating what the _client’s_ trust store is in a performant, privacy-preserving way. <a href="https://datatracker.ietf.org/doc/draft-kampanakis-tls-scas-latest/01/" rel="nofollow">https://datatracker.ietf.org/doc/draft-kampanakis-tls-scas-l...</a> or <a href="https://datatracker.ietf.org/doc/draft-davidben-tls-merkle-tree-certs/" rel="nofollow">https://datatracker.ietf.org/doc/draft-davidben-tls-merkle-t...</a> are explorations of the problem space above, though: how to have the server understand what the client will trust, so it can send the right certificate (… and omit the chain)</p>
]]></description><pubDate>Tue, 09 Jan 2024 00:07:27 +0000</pubDate><link>https://news.ycombinator.com/item?id=38920425</link><dc:creator>sleevi</dc:creator><comments>https://news.ycombinator.com/item?id=38920425</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=38920425</guid></item><item><title><![CDATA[New comment by sleevi in "Article 45 of eIDAS 2.0 will roll back web security by 12 years"]]></title><description><![CDATA[
<p>Because this is not the “start of drafting” but roughly “final text that is largely a rubber stamp approval.” This is the output of having been through the the trilogue process - where the Parliament would/has shut things down before - and not been shut down.<p>[1] <a href="https://en.m.wikipedia.org/wiki/Formal_trilogue_meeting" rel="nofollow noreferrer">https://en.m.wikipedia.org/wiki/Formal_trilogue_meeting</a></p>
]]></description><pubDate>Wed, 08 Nov 2023 02:19:05 +0000</pubDate><link>https://news.ycombinator.com/item?id=38185960</link><dc:creator>sleevi</dc:creator><comments>https://news.ycombinator.com/item?id=38185960</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=38185960</guid></item><item><title><![CDATA[New comment by sleevi in "What the QWAC? An EV Certificate all over again"]]></title><description><![CDATA[
<p>> and the recent legislation coming from there seems very inspired by the great firewall.<p><a href="https://www.europarl.europa.eu/RegData/etudes/STUD/2020/648784/IPOL_STU(2020)648784_EN.pdf" rel="nofollow noreferrer">https://www.europarl.europa.eu/RegData/etudes/STUD/2020/6487...</a></p>
]]></description><pubDate>Wed, 08 Nov 2023 02:11:33 +0000</pubDate><link>https://news.ycombinator.com/item?id=38185905</link><dc:creator>sleevi</dc:creator><comments>https://news.ycombinator.com/item?id=38185905</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=38185905</guid></item><item><title><![CDATA[New comment by sleevi in "Will browsers be required by law to stop you from visiting infringing sites?"]]></title><description><![CDATA[
<p>The EU is currently proposing to mandate the inclusion of roots that have been government approved, and to limit browsers from removing/distrusting them without notice/approval.<p><a href="https://www.eff.org/deeplinks/2022/12/eidas-20-sets-dangerous-precedent-web-security" rel="nofollow noreferrer">https://www.eff.org/deeplinks/2022/12/eidas-20-sets-dangerou...</a></p>
]]></description><pubDate>Sat, 05 Aug 2023 14:31:47 +0000</pubDate><link>https://news.ycombinator.com/item?id=37012369</link><dc:creator>sleevi</dc:creator><comments>https://news.ycombinator.com/item?id=37012369</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=37012369</guid></item><item><title><![CDATA[New comment by sleevi in "Mozilla publishes position paper on the EU Digital Identity Framework"]]></title><description><![CDATA[
<p>It’s actually a huge issue - look at how eliminating a key difficulty in obtaining certificates massively increased HTTPS adoption (via LetsEncrypt and others)<p>Similarly, automation affects how easy or hard it is to replace a CA, for example, if moving to distrust a CA. If you rely on QWAC attributes, you can only use QWAC CAs, and changing CAs becomes significantly more complex.<p>The audit issue is definitely an issue: the audits used are fundamentally different than what browsers try to achieve, and so having to adopt the lower standard definitely impacts user security. However, my point was that in addition to those concerns, the technical design itself results in less robust and less agile systems, and that makes things less secure.</p>
]]></description><pubDate>Wed, 17 Nov 2021 23:51:36 +0000</pubDate><link>https://news.ycombinator.com/item?id=29260451</link><dc:creator>sleevi</dc:creator><comments>https://news.ycombinator.com/item?id=29260451</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=29260451</guid></item><item><title><![CDATA[New comment by sleevi in "Mozilla publishes position paper on the EU Digital Identity Framework"]]></title><description><![CDATA[
<p>Yes, the current regulation is targeted at government sites authenticating citizens, but the goal with these revisions is to require VLOPs to support this, along with allowing them the ability to require this for all websites. The original roadmap called out by the European Agency for Cybersecurity (ENISA) suggests a long-term goal of making this mandatory, effectively reviving the idea of the “Internet drivers license” (for users) and “Authorized domestic website” (for servers).<p>Source: <a href="https://www.enisa.europa.eu/publications/qualified-website-authentication-certificates/@@download/fullReport" rel="nofollow">https://www.enisa.europa.eu/publications/qualified-website-a...</a></p>
]]></description><pubDate>Wed, 17 Nov 2021 20:48:29 +0000</pubDate><link>https://news.ycombinator.com/item?id=29258633</link><dc:creator>sleevi</dc:creator><comments>https://news.ycombinator.com/item?id=29258633</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=29258633</guid></item><item><title><![CDATA[New comment by sleevi in "Mozilla publishes position paper on the EU Digital Identity Framework"]]></title><description><![CDATA[
<p>The QWACs can be issued by anyone who meets the minimum requirements, which are substantially less than those required for TLS server CAs in browsers. So while it’s true that banks can issue these, in practice there are many small companies with fewer than a thousand or so certs out there which have the same requirement that they must be accepted.<p>The eID certificates do come with probative (legal) effect, but this is where it gets complicated.<p>If the CA is hacked or screws up, yes, the CA is liable. But only if you did everything you were supposed to, such as checking every element of the certificate. These certificates have a variety of fields, such as “liability only up to XX euros”, and you (the site or user) are liable if you use it for more than that.<p>PSD2 has shown that the standards are a nightmare to fully implement. <a href="https://wso2.com/blogs/thesource/all-you-need-to-know-about-eidas-for-open-banking/" rel="nofollow">https://wso2.com/blogs/thesource/all-you-need-to-know-about-...</a> gives a useful overview of how it’s worked for PSD2, and the new Digital Identity Framework/eIDAS Revisions proposes to make that the approach the standard everywhere.<p>In practice, this means that the server accepting your certificate needs to implement all of this correctly (spoiler: they don’t), or they bear the liability if the CA gets hacked - and they can’t distrust that CA. It also means the CA potentially learns every site you visit, because the sites have to check with the CA (if using OCSP).<p>Of course, if the government themselves directed the CA to misissue - e.g. at the direction of law enforcement - no such liability would be presumed, because it was a presumably lawful issuance.</p>
]]></description><pubDate>Wed, 17 Nov 2021 20:45:23 +0000</pubDate><link>https://news.ycombinator.com/item?id=29258602</link><dc:creator>sleevi</dc:creator><comments>https://news.ycombinator.com/item?id=29258602</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=29258602</guid></item><item><title><![CDATA[New comment by sleevi in "Mozilla publishes position paper on the EU Digital Identity Framework"]]></title><description><![CDATA[
<p>The proposed regulation requires that QWACs MUST be accepted and recognized as such, such as using the European List of Trusted Lists as part of the root store.<p>That is, if a QWAC is issued by a CA that is not part of the browser root store, it must not be rejected (as any other untrusted certificate would be).</p>
]]></description><pubDate>Wed, 17 Nov 2021 18:44:21 +0000</pubDate><link>https://news.ycombinator.com/item?id=29257111</link><dc:creator>sleevi</dc:creator><comments>https://news.ycombinator.com/item?id=29257111</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=29257111</guid></item><item><title><![CDATA[New comment by sleevi in "Mozilla publishes position paper on the EU Digital Identity Framework"]]></title><description><![CDATA[
<p>One element that results in less security is that it becomes more difficult to replace.<p>For example, QWACs cannot legally be automated (e.g. via ACME), because of certain restrictions applied to needing to validate the natural or legal person making the certificate request. This actually was an issue for one CA (BuyPass) that tried to support ACME but ran afoul of the framework.<p>While originally QWACs were proposed as optional, regulation such as PSD2 attempts to make them mandatory for (financial services) servers to obtain. If one of those keys is compromised, then the server wishing you obtain a replacement certificate may have to wait weeks to obtain such a certificate, or make an in-person visit to the CA (e.g. the post office).<p>A considerable number of compromised or misissued certificates have failed to been revoked on the industry-agreed upon timelines (24 hours or 5 days, depending), because of challenges CAs have faced because their customers haven’t (or legally can’t) automate replacement, and because the additional information in the certificate requires manual validation, despite having no technical impact on the TLS connection.</p>
]]></description><pubDate>Wed, 17 Nov 2021 18:40:58 +0000</pubDate><link>https://news.ycombinator.com/item?id=29257056</link><dc:creator>sleevi</dc:creator><comments>https://news.ycombinator.com/item?id=29257056</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=29257056</guid></item><item><title><![CDATA[New comment by sleevi in "Mozilla publishes position paper on the EU Digital Identity Framework"]]></title><description><![CDATA[
<p>Yes. It requires the EU Trustmark, a logo designed through a secondary-school competition, to be displayed with certain colors and sizing, as directed through Implementing Acts (which have the force of law, but decided at the Commission level).</p>
]]></description><pubDate>Wed, 17 Nov 2021 18:36:29 +0000</pubDate><link>https://news.ycombinator.com/item?id=29256994</link><dc:creator>sleevi</dc:creator><comments>https://news.ycombinator.com/item?id=29256994</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=29256994</guid></item><item><title><![CDATA[New comment by sleevi in "Mozilla publishes position paper on the EU Digital Identity Framework"]]></title><description><![CDATA[
<p>The draft revisions actually propose such authentication to be mandatory to implement for service providers if their users would like to use it.<p>That is, it specifically targets websites (particularly Very Large Online Platforms) that they MUST accept such ID in lieu of an email or password, at the user’s request. This was part of the original motivation for the revisions, to target “Sign in with Facebook” or “Sign in with Google” and require such sites also offer a “Login with EU” option.<p>Source: <a href="https://eur-lex.europa.eu/legal-content/EN/ALL/?uri=COM%3A2021%3A281%3AFIN" rel="nofollow">https://eur-lex.europa.eu/legal-content/EN/ALL/?uri=COM%3A20...</a></p>
]]></description><pubDate>Wed, 17 Nov 2021 18:33:35 +0000</pubDate><link>https://news.ycombinator.com/item?id=29256952</link><dc:creator>sleevi</dc:creator><comments>https://news.ycombinator.com/item?id=29256952</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=29256952</guid></item><item><title><![CDATA[New comment by sleevi in "Mozilla publishes position paper on the EU Digital Identity Framework"]]></title><description><![CDATA[
<p><a href="https://eur-lex.europa.eu/legal-content/EN/ALL/?uri=COM%3A2021%3A281%3AFIN" rel="nofollow">https://eur-lex.europa.eu/legal-content/EN/ALL/?uri=COM%3A20...</a></p>
]]></description><pubDate>Wed, 17 Nov 2021 18:30:17 +0000</pubDate><link>https://news.ycombinator.com/item?id=29256896</link><dc:creator>sleevi</dc:creator><comments>https://news.ycombinator.com/item?id=29256896</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=29256896</guid></item><item><title><![CDATA[Revisiting BetterTLS: Certificate Path Building]]></title><description><![CDATA[
<p>Article URL: <a href="https://netflixtechblog.com/revisiting-bettertls-certificate-path-building-4c978b79843f?gi=ec1423797d10">https://netflixtechblog.com/revisiting-bettertls-certificate-path-building-4c978b79843f?gi=ec1423797d10</a></p>
<p>Comments URL: <a href="https://news.ycombinator.com/item?id=28889484">https://news.ycombinator.com/item?id=28889484</a></p>
<p>Points: 6</p>
<p># Comments: 0</p>
]]></description><pubDate>Sat, 16 Oct 2021 17:20:59 +0000</pubDate><link>https://netflixtechblog.com/revisiting-bettertls-certificate-path-building-4c978b79843f?gi=ec1423797d10</link><dc:creator>sleevi</dc:creator><comments>https://news.ycombinator.com/item?id=28889484</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=28889484</guid></item><item><title><![CDATA[New comment by sleevi in "Another free CA as an alternative to Let's Encrypt"]]></title><description><![CDATA[
<p>Do you have links to documentation on the Apple Pay requirement?<p>That sounds like Apple Pay is encouraging certificate pinning, and I suspect the Apple Root Program may have opinions to the contrary, given how it puts Apple users at risk to encourage pinning.</p>
]]></description><pubDate>Fri, 20 Aug 2021 18:57:58 +0000</pubDate><link>https://news.ycombinator.com/item?id=28249985</link><dc:creator>sleevi</dc:creator><comments>https://news.ycombinator.com/item?id=28249985</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=28249985</guid></item><item><title><![CDATA[New comment by sleevi in "SAML Is Insecure by Design"]]></title><description><![CDATA[
<p>As others have noted, many of these issues are fundamental to XML DSig, which is insecure by design. [1]<p>However, the “what does the future hold” of OIDC is not much brighter. OIDC is based on JSON Web Tokens (JWT), which manages to avoid some of these issues (e.g. signs the encoded value), but introduces new ones (JSON interpretation bugs, algorithm substitution bugs, etc). They’re similarly terrible by design [2].<p>However, what OIDC does relating to signing is far worse. In many OIDC deployments, the idea is you use something called “OIDC Discovery” [3] to discover the expected signing keys for the OIDC server. You fetch those regularly (e.g. daily), and do so over TLS. With SAML, you exchange certificates, and then rotate them every 2-3 years (with things blowing up on expiration), but with OIDC, you often end up using OIDC-Discovery, and thus can change keys daily.<p>This means that a single malicious TLS certificate can be used to MITM your OIDC Discovery exchange, and from there, impersonate any user from the identity provider to your system, the relying party.<p>I spend my days in the TLS trenches, working to improve the CA ecosystem, but I absolutely would not trust the security of all users to a TLS certificate. The reality is that BGP hijacks are still a regular thing, as are registrar hijacks. Even if you find out about a malicious certificate (via Certificate Transparency), and revoke it, virtually none of your tools doing the OIDC-Discovery fetch (like programming languages or curl) support revocation checking, and even if they did, it doesn’t work at Internet scale. To deal with this problem, some relying parties do a form of poor-man’s certificate pinning, but now they’re at risk of even greater operational failures than SAML expiration in the start.<p>In practice, it seems plenty of OIDC clients just shrug and go “yolo” - if they’re talking TLS to the IDP, that’s good enough, and no need to bother with signature validation of the assertion at all.<p>For all my hatred of XML DSig and SAML, I’ve seen few auth standards as bad as OIDC: because it looks good, but is hell to implement correctly. At least with SAML, you know it looks bad to begin with, so you’re hopefully on guard.<p>[1] <a href="https://www.nccgroup.com/globalassets/resources/us/presentations/isec-hill-attacking-xml-security-bh07.pdf" rel="nofollow">https://www.nccgroup.com/globalassets/resources/us/presentat...</a>
[2] <a href="https://news.ycombinator.com/item?id=14292223" rel="nofollow">https://news.ycombinator.com/item?id=14292223</a>
[3] <a href="https://openid.net/specs/openid-connect-discovery-1_0.html" rel="nofollow">https://openid.net/specs/openid-connect-discovery-1_0.html</a></p>
]]></description><pubDate>Thu, 05 Aug 2021 22:15:58 +0000</pubDate><link>https://news.ycombinator.com/item?id=28080721</link><dc:creator>sleevi</dc:creator><comments>https://news.ycombinator.com/item?id=28080721</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=28080721</guid></item><item><title><![CDATA[New comment by sleevi in "Beware of Applications Misusing Root Stores"]]></title><description><![CDATA[
<p>Example app: NuGet for .NET on Linux and MacOS, from Microsoft: <a href="https://github.com/NuGet/Announcements/issues/56" rel="nofollow">https://github.com/NuGet/Announcements/issues/56</a><p>It used SSL/TLS and S/MIME roots to verify code signing and timestamping responses. When Symantec, which was removed for TLS trust, was also removed for S/MIME, NuGet broke, because it was no longer able to verify the TSA signature.<p>As covered in <a href="https://github.com/NuGet/Home/issues/10504" rel="nofollow">https://github.com/NuGet/Home/issues/10504</a> , this then led some Linux distros, notably Debian/Ubuntu, to re-add Symantec.<p>Any application using the ca-certificates package thus end up trusting CAs that Mozilla does not trust, despite being derived from the Mozilla Root Store.<p>So the news is already out there, this was just a reminder to folks to <i>not</i> do silly things like Microsoft did.</p>
]]></description><pubDate>Mon, 10 May 2021 22:51:24 +0000</pubDate><link>https://news.ycombinator.com/item?id=27111842</link><dc:creator>sleevi</dc:creator><comments>https://news.ycombinator.com/item?id=27111842</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=27111842</guid></item><item><title><![CDATA[New comment by sleevi in "Preparing Rustls for Wider Adoption"]]></title><description><![CDATA[
<p>Using (defined) properties of the TLS ClientHello to determine how the server will respond.<p>For example, changing the certificate used based on the ALPN identity, the SNI server host, and the advertised client ciphersuites.</p>
]]></description><pubDate>Tue, 20 Apr 2021 16:56:02 +0000</pubDate><link>https://news.ycombinator.com/item?id=26877270</link><dc:creator>sleevi</dc:creator><comments>https://news.ycombinator.com/item?id=26877270</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=26877270</guid></item><item><title><![CDATA[New comment by sleevi in "The Chrome Root Program"]]></title><description><![CDATA[
<p>No more related to Android than any other Chrome supported OS.<p>The post linked in the article, <a href="https://g.co/chrome/root-policy" rel="nofollow">https://g.co/chrome/root-policy</a> makes it clear: the goal is to provide a consistent, cross-platform experience to the Web.<p>Users, and developers, hate “it doesn’t work on my machine” bugs, which are incredibly common. Sites that work on Chrome on macOS 10, but not macOS 11, or work on Chrome on Windows 10 but not Chrome on Windows 7. Giving developers and site operators predictable guidance, so that it “works in Chrome, works in Firefox” is good, no different than what Web Platform features you can use as <a href="https://caniuse.com" rel="nofollow">https://caniuse.com</a><p>Yes, Android is important, but it’s a bit like saying the forest exists because of this specific tree here, when in fact it’s made up of hundreds of trees, of all sorts of types.</p>
]]></description><pubDate>Thu, 03 Dec 2020 14:21:01 +0000</pubDate><link>https://news.ycombinator.com/item?id=25289033</link><dc:creator>sleevi</dc:creator><comments>https://news.ycombinator.com/item?id=25289033</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=25289033</guid></item><item><title><![CDATA[New comment by sleevi in "The Chrome Root Program"]]></title><description><![CDATA[
<p><a href="https://cloud.google.com/docs/chrome-enterprise/policies?policy=RequireOnlineRevocationChecksForLocalAnchors" rel="nofollow">https://cloud.google.com/docs/chrome-enterprise/policies?pol...</a><p>There’s more that could be said, but I can see this is an emotionally loaded subject for you, so perhaps it’s best dealt with as it rolls out. Every feature has a cost: to complexity (CTLs are notoriously ‘weird’ on Windows, for example), to security (LDAP is a terrible protocol due to BER), or simply in the maintenance costs that prevent security improvements. Software engineering is about weighing those trade-offs: do you implement the feature that 10-100 users use, or do you spend time improving things for the other billion users? There are limits to what can be supported, and limits to what is even good to support in the first place, and while such pragmatism may seem like arrogance, the reality is less malicious: it just isn’t good software.<p>In any event, making sure usage statistics are enabled, and bugs are filed when actually, is a good way to help prioritize.</p>
]]></description><pubDate>Thu, 03 Dec 2020 14:14:10 +0000</pubDate><link>https://news.ycombinator.com/item?id=25288966</link><dc:creator>sleevi</dc:creator><comments>https://news.ycombinator.com/item?id=25288966</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=25288966</guid></item></channel></rss>