▲ | tremon 2 days ago | ||||||||||||||||
But that 47-day lifetime is enforced by the certificate authority, not by the browser, right? So a bad actor can still issue a multi-year certificate for itself, and in the absence of side-channel verification the browser is none the wiser. Or will browsers be instructed to reject long-lived certificates under specific conditions? | |||||||||||||||||
▲ | sugarpimpdorsey 2 days ago | parent | next [-] | ||||||||||||||||
Wrong. Enforcement is done by the browser. Yes, a CA's certificate policy may govern how long a certificate they will issue. But should an error occur, and a long-lived cert issued (even maliciously), the browser will reject it. The browser-CA cartels stay relatively in sync. You can verify this for yourself by creating and trusting a local CA and try issuing a 5 year certificate. It won't work. You'll have a valid cert, but it won't be trusted by the browser unless the lifetime is below their arbitrary limit. Yet that certificate would continue to be valid for non-browser purposes. | |||||||||||||||||
| |||||||||||||||||
▲ | avianlyric 2 days ago | parent | prev | next [-] | ||||||||||||||||
> So a bad actor can still issue a multi-year certificate for itself, and in the absence of side-channel verification the browser is none the wiser. How would a bad actor do that without a certificate authority being involved? | |||||||||||||||||
| |||||||||||||||||
▲ | arccy 2 days ago | parent | prev [-] | ||||||||||||||||
the browsers will verify, and every cert will be checked against transparency logs. you won't be able to hide a long lived cert for very long. |