Conversation

Last example. In this HashiCorp talk (17:56 in video, "Verifying communications" section in transcript), solving SSH host key verification via Terraform and cloud-init is discussed: hashicorp.com/resources/clou That makes both Chris and I happy. (6/n)
1
2
SSHFP works well. I set it up for every A/AAAA record with a bogus value if it's something like a DNS round robin record that's not supposed to used for login. Consider it part of the same thing as setting up DANE TLSA records for every TLS service which is each non-SSH service.
1
2
WebPKI offers no real value over DANE TLSA records beyond Certificate Transparency and only Chromium fully enforces CT as of this month when backdating certificates to bypass it stopped being possible (due to 3 year issuance when they started requiring CT). Just started working.
2
1
Reality is that if you control DNS or at least can appear to control DNS, you can trivially obtain a valid Let's Encrypt or other CA certificate. It's not really misissuance if you don't have DNSSEC + CAA. Hardly anyone checks CT meaningfully beyond making sure it's the right CA.
1
1
I'm looking forward to Let's Encrypt deploying accounturi support to production. They have it in staging (used for dry runs by certbot, etc.) but I can't get information on when it's going to be deployed to production. We use that for grapheneos.org, etc. alongside TLSA.
accounturi at least makes certificate issuance secure for the CA you choose to trust. It doesn't stop other CAs from ignoring DNSSEC/CAA, being compromised, etc. but at least for us our users can assume it's an invalid certificate if it's not Let's Encrypt which is easy to check.
2
Show replies