▲ | avodonosov 3 days ago | ||||||||||||||||||||||
First impression: with automation and short lived certificates, the Certifying Authorities become similar to Identity Providers / OpenID Provider in openid / openid-connect. The certificates are tokens. And significant part of security is concentrated around the way Certifying Authorities validate the domain ownership. (So called challenges). Next, maybe clients can run those challenges directly, instead of relying onto certificates? For example, when connecting a server, client client sends two unique values, and the server must create DNS record <unique-val-1>.server.com with record value of the <unique-val-2>. Client check that such record is created and thus the server has proven it controls the domain name. Auth through DNS, that's what it is. We will just need to speed up the DNS system. | |||||||||||||||||||||||
▲ | NicolaiS 3 days ago | parent | next [-] | ||||||||||||||||||||||
This will not work as any attacker that can MITM the client (likely scenario for end-users), can also MITM this "certificate issuing" setup and issue their own cert. The reason an attacker can't MITM Let's Encrypt (or similar ACME issuers) is because they request the challenge-response from multiple locations, making sure a simple MITM against them doesn't work. A fully DNS based "certificate setup" already exists: DANE, but that requires DNSSEC, which isn't wildly used. | |||||||||||||||||||||||
| |||||||||||||||||||||||
▲ | fpoling 3 days ago | parent | prev [-] | ||||||||||||||||||||||
That does not work as DNS is insecure. DNSSEC is not there and may never will. | |||||||||||||||||||||||
|