Cert pinning

Gary E. Miller gem at rellim.com
Thu Mar 28 23:40:20 UTC 2019


Yo Richard!

On Thu, 28 Mar 2019 18:36:54 -0500
Richard Laager via devel <devel at ntpsec.org> wrote:

> On 3/28/19 6:26 PM, Hal Murray via devel wrote:
> > 
> > Gary said:  
> >>> There is a downside. Every time it changes, you have to take
> >>> a leap of faith when you re-pin it, rather than getting normal
> >>> CA validation.  
> >> You miss the point, this is addition to normal CA validation, not
> >> an alternative to it.  Just like HPKP.   
> > 
> > I'm missing something important.  Why would I need additional
> > validation? Isn't normal certificate validation good enough?  
> 
> In normal validation, ANY root CA can sign a certificate for my domain
> and it will be trusted by clients.

Yes, a bad thing.  Why DANE and HPKP were invented.

> I might want to pin the NTS association for ntp1.wiktel.com to require
> that its certificate be issued by Let's Encrypt. Or, I might want to
> pin it to my internal CA.

Yup.  Now you're getting it.  Thus the 4 DANE types.

RGDS
GARY
---------------------------------------------------------------------------
Gary E. Miller Rellim 109 NW Wilmington Ave., Suite E, Bend, OR 97703
	gem at rellim.com  Tel:+1 541 382 8588

	    Veritas liberabit vos. -- Quid est veritas?
    "If you can’t measure it, you can’t improve it." - Lord Kelvin
-------------- next part --------------
A non-text attachment was scrubbed...
Name: not available
Type: application/pgp-signature
Size: 851 bytes
Desc: OpenPGP digital signature
URL: <https://lists.ntpsec.org/pipermail/devel/attachments/20190328/6b42ab78/attachment-0001.bin>


More information about the devel mailing list