<rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Hacker News: stderr5150</title><link>https://news.ycombinator.com/user?id=stderr5150</link><description>Hacker News RSS</description><docs>https://hnrss.org/</docs><generator>hnrss v2.1.1</generator><lastBuildDate>Thu, 30 Apr 2026 21:44:37 +0000</lastBuildDate><atom:link href="https://hnrss.org/user?id=stderr5150" rel="self" type="application/rss+xml"></atom:link><item><title><![CDATA[New comment by stderr5150 in "The Heartbleed Bug"]]></title><description><![CDATA[
<p>I disagree. Revoking the certificate is a requirement. If you re-key without revoking, that means someone who has stolen your key could impersonate you until the validity period expires. So revoking is a needed if you want to inoculate yourself against a potential active man-in-the-middle attack.<p>If you want to be secure, make sure the certificate based on your old key is showing up in the certificate revocation list (CRL), and/or any online certificate status protocol (OCSP) servers it specifies.</p>
]]></description><pubDate>Wed, 09 Apr 2014 04:16:45 +0000</pubDate><link>https://news.ycombinator.com/item?id=7557618</link><dc:creator>stderr5150</dc:creator><comments>https://news.ycombinator.com/item?id=7557618</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=7557618</guid></item></channel></rss>