Remix.run Logo
glitchc 3 days ago

You're clearly not using these keys in certificates, which would need to be signed by a root or interim CA on every update.

bob1029 3 days ago | parent [-]

Correct. The keys are only used for signing JWTs. Trust was established with the vendor out of band from this wire protocol (the URL they scan for public keys).

SahAssar 2 days ago | parent [-]

I'm not sure I understand, but haven't you just moved the problem to the out of band layer? And is that layer not secured using the same normal (somewhat) long-lived TLS as most sites?

I don't think I understand the threat model you are using here?

bob1029 2 days ago | parent [-]

Think of the out of band layer as two human executives exchanging URLs and GUIDs in person. You still need a secure transport, but in this model the thing that is being secured on the wire expires within 15 minutes. The only way to break the model is to defeat a transport or protocol key and only before rotation, revocation and expiration can catch up each time.