nottorp a day ago

7 days is too long! It should be 30 minutes!

  • xyzzy123 a day ago

    Certificate per request

    • karel-3d 19 hours ago

      that's just OTR

      • pona-a 3 hours ago

        OTR still has static identities, with DH used to ratchet the ephemeral keys. The comparison would be more like Signal ditching Safety Numbers and Registration Lock for hourly SMS verification of new independent keys with no successor signing.

        There's a fundamental divide in what certificates mean: modern CAs view WebPKI as a fancy vantage point check--cryptographic session tickets that attest to the the actual root of trust, usually DNS. Short-lived certs (down to 10 minutes in Sigstore, 6 days trialed by LetsEncrypt) make perfect sense to them.

        But DNS challenges are perfectly forgeable by whoever controls the DNS. This reduces authentication to "the CA says so" for 99% of users not running a private CA alongside the public one.

        Transparency logs become impenetrable to human review, and even if you do monitor your log (most don't), you need a credible out-of-band identity to raise the alarm if compromised. The entire system becomes a heavier Convergence/DANE-like vantage point check, assuming log operators actually reverify the DNS challenges (I don't think one-time LetsEncrypt challenges are deterministic).

        I think certificates should represent long-term cryptographic identity, unforgeable by your CA and registrar after issuance. The CA could issue a one-time attestation that my private root cert belongs to my domain, and when it changes, alert to the change of ownership.

    • nottorp a day ago

      Of course, so we have another global failure/censorship point besides Cloudflare…

      • [removed] a day ago
        [deleted]
      • DaSHacka 18 hours ago

        Yes, that's the whole point..

        Er, I mean, its totally for security guys!

  • hulitu 4 hours ago

    > 7 days is too long! It should be 30 minutes!

    And secure boot shall be signed with it. /s