top | item 35490740

Add Honest Achmed's root certificate (2011)

73 points| timothyg | 2 years ago |bugzilla.mozilla.org

25 comments

order

rocqua|2 years ago

For a long time, I've argued we need leaf certificates to be double signable. That way there can be two chains of trust for a website. Then dropping a CA doesn't matter much, since all serious parties should have multiply signed paths to various roots of trust. Hence we solve the problem of CAs becoming to big to fail.

The current way cross-signing works is almost an accident, and only works for intermediate certificates. Because the 'signing cert' is looked up by name. An intermediate cert can be published twice with the same name, same key, but different signatures and signing cert. Hence doing this for a leaf certificate would mean 'just get two certificates'.

saurik|2 years ago

I see what you meant--having two for redundancy--but I was much more excited by the idea of having two where both had to be valid, as getting two organizations to issue you a bogus certificate is going to be a hell of a lot harder than getting one (not impossible, but often an entirely different kind of attack). Maybe we require three and at least two have to be valid, providing the benefits of both angles? ;P

voz_|2 years ago

I never find this kind of stuff funny... it's more snark than humor. It's also got a weird racial tinge on the tiresome trope of a somewhat distrustful middle eastern laborer, which makes it gross.

antonvs|2 years ago

How is he somewhat distrustful? He’s Honest Achmed, it’s right there in the name. And the application is certainly very honest.

Dalewyn|2 years ago

When all you have is a hammer, everything looks like a nail.

vcuto|2 years ago

[deleted]

hkt|2 years ago

Classic of the genre.

I remember around the time of the diginotar horrors looking at DANE and DNSSEC. As I understand it, DANE still isn't supported by browsers, and DNSSEC is still in a pitiful state.

tptacek|2 years ago

DANE is even worse than the CAs in this regard. Nobody trusts the CAs, so they all have to record all their issuances in a transparency log. If a CA misissues, the browsers will kill it (as has happened with some of the largest CAs). There's no way to revoke a misissued DNSSEC signature and there's no transparency log for DNSSEC, nor will there ever be, because the browsers can't force DNS registries to implement it the way they could force CAs.

userbinator|2 years ago

Inclusion policy is here

12 years ago, that meant something different.

ThePhysicist|2 years ago

Seems quite racist to me using the stereotype of the middle eastern shady used cars dealer? Do we want such content here (I'd say no)?

justsomehnguy|2 years ago

> Seems quite racist to me

So if it was Honest John you would be okay with that?

> Do we want such content here (I'd say no)?

You have 'flag' and 'downvote' buttons for this.

kimi|2 years ago

So the ACME protocol is a play on Achmed?

vcuto|2 years ago

[deleted]

awestroke|2 years ago

How much does an audit cost? How much work would it be to get Honest Achmeds root cert added to all major OSs and browsers?

labster|2 years ago

Only 11 years later, Elon Musk started selling blue check marks on Twitter. Achmed was ahead of his time.

biorach|2 years ago

Please, "Honest Elon"

awestroke|2 years ago

They were already meaningless