Conversation

At the moment, Let's Encrypt primarily issues certificates based on insecure, authenticated HTTP-based validation of domain control. They validate DNSSEC but the HTTP-01 method by itself is insecure and the DNS-01 method requires giving servers DNS API access which isn't good.
2
27
Replying to
You do realize that uses multiple vantage points to verify, correct? So, yes, if you're hosting provider or their ISP intercepts requests, you're screwed, but IMO, you need a new hosting provider/ISP if this ever happens.
1
By the way, CAs aren't even required to support DNSSEC. It's highly recommended by the CAA standard, but not mandatory. Let's Encrypt of course implements DNSSEC but it's definitely not the case overall and CAA depends on every CA actually checking it securely which kinda sucks.
1
1
Show replies