• jagged_circle@feddit.nl
    link
    fedilink
    English
    arrow-up
    3
    arrow-down
    3
    ·
    4 days ago

    Yes X.509 is broken. If you’re a developer and not pinning certs, you’re doing it wrong.

      • jagged_circle@feddit.nl
        link
        fedilink
        English
        arrow-up
        7
        arrow-down
        12
        ·
        edit-2
        4 days ago

        What part are you confused about, and are you a developer?

        Edit: why was I downvoted for asking this?

        • semi [he/him]@lemmy.ml
          link
          fedilink
          English
          arrow-up
          13
          ·
          4 days ago

          I’m a developer and would appreciate you going into more specifics about which certificates you suggest pinning.

          • jagged_circle@feddit.nl
            link
            fedilink
            English
            arrow-up
            9
            arrow-down
            3
            ·
            edit-2
            4 days ago

            I’m saying that if you’re a developer of software that communicates between two nodes across the internet, you shouldn’t rely on X.509 because the common root stores have historically been filled with compromised CAs, which would let someone with that CA decrypt and view the messages you send with TLS.

            You should mint your own certs and pin their fingerprints so that your application will only send messages if the fingerprint of the cert on the other end matches your trusted cert.

            • Pieisawesome@lemmy.world
              link
              fedilink
              English
              arrow-up
              4
              arrow-down
              1
              ·
              4 days ago

              And your software stops functioning after X years due to this.

              Don’t do this, this is a bad idea.

              • TarantulaFudge@startrek.website
                link
                fedilink
                English
                arrow-up
                1
                ·
                3 days ago

                Technically all certificates are pinned, especially with public CAs, most OS package the latest CA certs which will all go out of style within 10 years or so. You can see this by loading up any old distro or defunct version of windows.

              • jagged_circle@feddit.nl
                link
                fedilink
                English
                arrow-up
                2
                arrow-down
                8
                ·
                4 days ago

                Yeah, fuck the users. We can just slap “100% secure” on the box and who cares if some woman is raped and murdered because we decided not to follow best security practices, right? /s

    • oldfart@lemm.ee
      link
      fedilink
      English
      arrow-up
      3
      ·
      4 days ago

      Yeah, now imagine pinning certs that change weekly.

      My first thought is that old school secure software (like claws-mail) treats a cert change as a minor security incident, asking you to confirm every time. Completely different school of thought.