TIL Chrome ignores CRL. Instead, it pushes out a curated list of invalidated certificates that it thinks are important enough to know about.

And no, we can't see the list.

So, if my web store is hacked and I invalidate the certificate, Chrome users will never know.

Excellent.

@mwlucas Hey, Certificate Transparency solves all 🤮 Have I introduced you to my lord and savior ? :)

@david

Dude, I wrote the book on DANE. :flan_wink:

Needs updating, mind you...

@mwlucas We need to get DANE adopted, all of these CA SSL workarounds just SUCK.

And with ESNI they're not even bothering to pretend that a DNS lookup per request or putting public key information in DNS is "bad" anymore,

@david @mwlucas

Mozilla does not want to work on that (integrating DANE validation in browser).

So no hope in sight. 😢​

Follow

@mwlucas @22decembre Never thought about it.

But the question is 'why?' they don't love the CA cartel, they've undercut the CAs at every opportunity. Their solutions of certificate pinning, certificate transparency, have been shown to be snakeoil and crap at every turn... What do they get by opposing DANE/DNSSEC... ESPECIALLY as they support a DNS powered ESNI?

· · Web · 1 · 0 · 0

@david @22decembre the only secure path is to give the Google all your business. Then they will help you.

@mwlucas @22decembre this reminds me of cloudflare's business model. Everything they do/support (ESNI, DoH, DNS) works better/faster if you are their customer, and slower than before if you are not.

Sign in to participate in the conversation
Cross Family's Mastodon

The social network of the future: No ads, no corporate surveillance, ethical design, and decentralization! Own your data with Mastodon!