Conversation

They appear to consistently check from 2 perspectives. If there's an attacker with a MITM to both locations, there's currently no way to defend against them getting a Let's Encrypt certificate until they ship the nice accounturi feature. DNSSEC + accounturi gives secure issuance.
This Tweet was deleted by the Tweet author. Learn more
WebPKI is build on poorly verifying domain control based on DNS. WebPKI depends on DNS security. Removing CAs from the picture and using DANE TLSA doesn't require trusting any additional parties but rather reduces trust to the entities in control of naming, who you trust anyway.
1
2
This Tweet was deleted by the Tweet author. Learn more
Open up a terminal and run `drill _443._tcp.grapheneos.org TLSA`. That's the leaf certificate (3) public key (1) sha256 hash (1). If you have DNSSEC validation, you've bootstrapped TLS. If someone can spoof DNS records, they can just issue certificates via Let's Encrypt, etc.
1