This seems like a good idea.
Comment on Decreasing Certificate Lifetimes to 45 Days
cron@feddit.org 2 weeks agoThe best approach for securing our CA system is the “certificate transparency log”. All issued certificates must be stored in separate, public location. Browsers do not accept certificates that are not there.
This makes it impossible for malicious actors to silently create certificates. They would leave traces.
Arghblarg@lemmy.ca 2 weeks ago
cron@feddit.org 2 weeks ago
The only disadvantage I see is that all my personal subdomains (e.g. immich.name.com and jellyfin) are forever stored in a public location. I wouldn’t call it a privacy nightmare, yet it isn’t optimal.
There are two workarounds:
- do not use public certificates
- use wildcard certificates only
Burnoutdv@feddit.org 2 weeks ago
But how to automate wildcard certificate generation? That requires a change of the txt record and namecheap for instance got no mechanism for that to automatically happen on cert bot action
cron@feddit.org 2 weeks ago
There are some nameserver providers that have an API.
When you register a domain, you can choose which nameserver you like. There are nameservers that work with certbot, choose one that does.
clif@lemmy.world 2 weeks ago
Doesn’t caddy support that (name cheap txt mod) via a plug-in?
I haven’t tried it yet, but the plugin made it sound possible. I’m planning to automate on next expiration… When I get to it ;)
I did already compile caddy with the plugin, just haven’t generated my name cheap token and tested.
False@lemmy.world 2 weeks ago
Isn’t this just CRL in reverse? Part of the point of cryptographically signing a cert is so you don’t have to do this if you trust the issuer.
cron@feddit.org 2 weeks ago
No, these are completely separate issues.
This is just one example why we have certificate transparency. Revocation wouldn’t be useful if it isn’t even known which certificates need revocation.
Source
Auli@lemmy.ca 2 weeks ago
Or the more likely a rouge certificate authority giving out certs it shouldn’t.