• shortwavesurfer@lemmy.zip
    link
    fedilink
    arrow-up
    16
    arrow-down
    2
    ·
    edit-2
    5 days ago

    As far as Let’s Encrypt goes, the easy way to solve that is self-signed SSL certificates and Tofu. Just make it stupid obvious if an SSL certificate changes on a site that you go to. Like, turn your browser into a giant red screen that says that the security of the website has changed and may be broken obvious. Maybe you could have search engines also index SSL certificates so you could see if Google and Bing and DuckDuckGo and whoever else all say that this website has the same SSL certificate that it has had for X amount of time and if the search engines start showing different results you get suspicious.

    Edit: Using self-signed certificates and tofu fits better with the decentralized ethos of the original web anyway since you’re not relying on some third-party authority to tell you what’s safe and what’s not.

    • WhyJiffie@sh.itjust.works
      link
      fedilink
      English
      arrow-up
      3
      ·
      4 days ago

      i don’t think this is a good idea. govs could just set up a big reverse proxy for lots of sites to serve them with their own certs, and you wouldn’t know

      • shortwavesurfer@lemmy.zip
        link
        fedilink
        arrow-up
        2
        ·
        4 days ago

        Seems like no change from right now, because currently the certificate authorities are centralized entities, which could be pressured by governments to add their own certificates.

    • Petter1@lemm.ee
      link
      fedilink
      arrow-up
      2
      ·
      4 days ago

      How about a Blockchain or Directed Acyclic Graph (DAG) out of SSL certs 🤔

      I think that would finally be a use case for that tech, lol

        • Petter1@lemm.ee
          link
          fedilink
          arrow-up
          1
          ·
          3 days ago

          If you issue a certificate, you proof ownership via * challenge–response test that is validated by each node. If x% (like eg. 70%) of nodes agree that the test is passed, the block counts as validated and can be placed onto the chain. (Each node places the block on their chain and the hash must be same as hash of chain of majority of nodes)

    • marauding_gibberish142@lemmy.dbzer0.com
      link
      fedilink
      English
      arrow-up
      3
      ·
      4 days ago

      Never heard of tofu before (the software). What is it?

      I had heard about DANE and how that would help in scaling back the need for big CAs but I could never grasp how one would do that. Do you know about it? I’m looking for someone to explain it to me.

      • shortwavesurfer@lemmy.zip
        link
        fedilink
        arrow-up
        6
        ·
        4 days ago

        Tofu stands for Trust on First Use. So basically, you would get an SSL certificate from the website the very first time you connected to it, instead of trusting a certificate authority. Then, if the SSL certificate changed, you would then be warned that the certificate had changed and would have to decide whether to trust the new certificate or not trust the new certificate. That’s why I said perhaps search engines could index certificates and tell you how long the certificate has been active and you could check several engines quickly to determine whether each engine has the same certificate indexed for the same website and if they did not then you would know something might be up.

        • Thorned_Rose@sh.itjust.works
          link
          fedilink
          English
          arrow-up
          3
          ·
          4 days ago

          I don’t feel like this adequately accounts for stupid people though. The number of times I’ve seen people freak out over a perfectly legit website because a cert warning popped up or others who have ignored the warning and clicked through to a scam or malware… 🤦‍♀️

          • shortwavesurfer@lemmy.zip
            link
            fedilink
            arrow-up
            2
            ·
            4 days ago

            Well, it really depends on if you want somebody to trust or not. If you don’t want to trust anybody except yourself, then you can just use Tofu and be good with it. The only reason I brought up using search engines as an index is just to give people a place to look.

            If I want to visit CNBC and I’ve never visited them before, I could just go straight to CNBC and trust their certificate right away. Or, if I wanted to confirm that the CNBC certificate was likely valid, I could ask DuckDuckGo, Google, and Quant. And if they all agreed that they had the same certificate that I was getting, I’d be more likely to think that it’s valid.

              • shortwavesurfer@lemmy.zip
                link
                fedilink
                arrow-up
                2
                ·
                4 days ago

                Well, you can just generate your own SSL certificate on your machine, locally. I believe you can probably do it with OpenSSL. I’ve only done it with my Monero node, and they offer a binary, which will generate a certificate for you. I would just look up how to create a self-signed SSL certificate. My guess is it’s just a few commands in the terminal.

                • marauding_gibberish142@lemmy.dbzer0.com
                  link
                  fedilink
                  English
                  arrow-up
                  2
                  ·
                  4 days ago

                  No, I meant the logic where the browser would prompt the user to review and verify the cert for a particular website without consulting a CA. I run some self-signed certs already but I’d love to implement this in my homelab.