Certificates
Hal Murray
hmurray at megapathdsl.net
Tue Jan 14 01:02:52 UTC 2020
Thanks.
>> Suppose you don't trust all those CAs. What can you do?
> Then they shouldn't be in your trust root to begin with. It's easy enough to
> remove a CA source file from the system cert store and rebuild it, although
> what to do is slightly different on each system.
The problem with that approach is that I don't know which one(s) to remove
until it is too late.
Specifying the root certificate to use for a particular server seemed like a
simple way to improve security. Logically, it's removing all but one. I
think i/we could write a HOWTO without a lot of work.
> That's CA pinning rather than certificate pinning. It only makes sense (to
> me anyway) if you expect to have multiple different certificates that refer
> to that CA, so maybe if you have a local CA that you don't want to advertise
> system-wide.
How do I do certificate pinning?
I poked around a bit and found HPKP - HTTP Public Key Pinning. That requires
extra work on the server side. In particular, it needs a second public key.
That doesn't seem compatible with Let's Encrypt.
I assume a local CA turns into self-signed certificates. They have to be
distributed somehow. We could probably use the web for that. That scales
well. It's minor extra one-time work for the server. It's an extra simple
step for the client. There are complications when the root certificate times
out.
--------
I'm looking for something that is practical. That means it doesn't require
operator intervention too often.
--
These are my opinions. I hate spam.
More information about the devel
mailing list