Conversation

Unless I'm mis-reading the domain history, this domain was (and is) DNSSEC signed and that did not prevent the takeover. The attackers move is to hi-jack the HTTP endpoints instead of DNS servers, get the cert through HTTP upload verification, and then MiTM.
Quote Tweet
Replying to @danielcormier and @campuscodi
Good question. With BGP hijack in progress, seems the hackers were able to obtain a valid TLS cert for developers.kakao.com, see crt.sh/?q=developers. (now revoked).
3
37
Replying to
You're seeing them right, and I'm seeing something different and now wonder if they are rolling out DNSSEC and I caught an experiment? It doesn't really change the dynamic ... hi-jack to HTTP works regardless :(
3
2
CAA doesn't really need to permit even one CAA most of the time, only when you're doing renewal. Ideally you have a CA which supports accounturi/validationmethods. I don't understand why Let's Encrypt still has those features in staging. Can have secure HTTP validation with it.
1
1
It pins your account which is authenticated via an ECDSA key and it doesn't matter that HTTP(S) validation is insecure. You can make an account with certbot, update CAA to pin new account and then get your certificate. Wish they'd finally ship this since it actually helps a lot.
1