GNU social JP
  • FAQ
  • Login
GNU social JPは日本のGNU socialサーバーです。
Usage/ToS/admin/test/Pleroma FE
  • Public

    • Public
    • Network
    • Groups
    • Featured
    • Popular
    • People

Notices by Andrew Ayer (agwa@follow.agwa.name)

  1. Embed this notice
    Andrew Ayer (agwa@follow.agwa.name)'s status on Thursday, 04-Sep-2025 09:30:58 JST Andrew Ayer Andrew Ayer
    in reply to
    • Andrew Ayer
    The first rogue 1.1.1.1 certificate was issued by Fina and logged to Certificate Transparency over a year ago.
    AFAICT, the first person to notice any of this was Hacker News user JXzVB0iA, two days ago: https://news.ycombinator.com/item?id=45089708
    This morning, it was reported to the certificate-transparency mailing list, with attribution to JXzVB0iA.
    A few hours later, it was reported to the mozilla-dev-security-policy mailing list, without attribution.
    Then Dan Goodin wrote his article, citing the mozilla-dev-security-policy post.
    Very surprising that Cloudflare did not notice given they operate a CT monitor.
    In conversation about 5 months ago from follow.agwa.name permalink

    Attachments

    1. Domain not in remote thumbnail source whitelist: news.ycombinator.com
      Fina Root CA signs certificates for 1.1.1.1 | Hacker News
  2. Embed this notice
    Andrew Ayer (agwa@follow.agwa.name)'s status on Thursday, 04-Sep-2025 09:30:29 JST Andrew Ayer Andrew Ayer
    Hey look, another certificate authority trusted ONLY by Microsoft is issuing certificates without validation (1.1.1.1/Cloudflare DNS in this case): https://crt.sh/?sha256=D42B028468E73795365102058CBCD350AD0A0B9CA7073C5362A570C5EC208A92
    (h/t Hacker News user JXzVB0iA)
    In conversation about 5 months ago from follow.agwa.name permalink

    Attachments


  3. Embed this notice
    Andrew Ayer (agwa@follow.agwa.name)'s status on Saturday, 28-Jun-2025 00:17:27 JST Andrew Ayer Andrew Ayer

    DO NOT USE THE APPMATTUS CERTIFICATE TRANSPARENCY ANDROID LIBRARY.

    Over two years ago the library's developers were warned about the need to monitor the ct-policy mailing list if they were going to consume the Chrome CT log lists.

    Over six months ago, an upcoming change to the log lists was announced on ct-policy.

    The Appmatus developers ignored this, so when the change was published today, Android apps using Appmatus stopped working. Affected app developers are now flooding CT mailing lists demanding the log list change be reverted. The right fix is to stop using Appmatus - it's clearly not fit for purpose.

    In conversation about 7 months ago from follow.agwa.name permalink
  4. Embed this notice
    Andrew Ayer (agwa@follow.agwa.name)'s status on Saturday, 28-Jun-2025 00:17:26 JST Andrew Ayer Andrew Ayer
    in reply to
    • Andrew Ayer
    The Appmattus CT library doesn't even need to exist anymore - as of Android 16, you can opt your app into Certificate Transparency enforcement provided by the OS: https://developer.android.com/privacy-and-security/security-config#certificateTransparencySummary
    In conversation about 7 months ago from follow.agwa.name permalink

    Attachments

    1. Domain not in remote thumbnail source whitelist: developer.android.com
      Network security configuration  |  Security  |  Android Developers
      Feature that allows app developers to customize network security settings in a safe configuration file.
  5. Embed this notice
    Andrew Ayer (agwa@follow.agwa.name)'s status on Saturday, 28-Jun-2025 00:17:25 JST Andrew Ayer Andrew Ayer
    in reply to
    • Andrew Ayer
    Folks at Google have taken time on a Saturday to roll out a creative hack to unbreak the apps using this library. The folks at Apple, Google, and Mozilla who work on WebPKI and CT policy are truly some of the Internet's unsung heroes, for this and many other reasons.
    In conversation about 7 months ago from follow.agwa.name permalink

    Attachments


    1. https://follow.agwa.name/media/ec/8a/00/ec8a0007c9053df10a1f8f20676f3045ce02fe6598b42aaf8ffa9dee857b6902.png
  6. Embed this notice
    Andrew Ayer (agwa@follow.agwa.name)'s status on Wednesday, 08-Jan-2025 21:57:18 JST Andrew Ayer Andrew Ayer
    Yesterday's Alpine Linux 3.21.1 release prematurely removed Entrust from the trust store, breaking TLS connections to servers using Entrust certs. They should have waited until Jan 2, 2026. Unfortunately, they vendor curl's mk-ca-bundle.pl and didn't update it after curl fixed this bug. https://gitlab.alpinelinux.org/alpine/ca-certificates/-/issues/6

    Alpine is a popular base image for containers so this has the potential to be disruptive.

    Background: https://sslmate.com/blog/post/entrust_distrust_more_disruptive_than_intended
    In conversation about a year ago from follow.agwa.name permalink

    Attachments

    1. Domain not in remote thumbnail source whitelist: sslmate.com
      The Entrust Distrust Will Be More Disruptive Than Intended
      from @SSLMate
      Non-browser clients don't properly handle the Distrust After date

    2. Domain not in remote thumbnail source whitelist: gitlab.alpinelinux.org
      ca-certificates bundle incorrectly excludes root CAs with CKA_NSS_SERVER_DISTRUST_AFTER (#6) · Issues · alpine / ca-certificates · GitLab
      The build script in ca-certificates incorrectly omits CA roots with a "DistrustAfter" attribute. See this fix in curl: https://github.com/curl/curl/commit/448df98d9280b3290ecf63e5fc9452d487f41a7c#diff-672849fde302af412196cdff759aa84b274074a01561227ee4f8c102c1ee346dL556...
  7. Embed this notice
    Andrew Ayer (agwa@follow.agwa.name)'s status on Sunday, 01-Dec-2024 03:19:29 JST Andrew Ayer Andrew Ayer
    A Brazilian certificate authority trusted only by Microsoft has issued a presumably-unauthorized certificate for google.com: https://bugzilla.mozilla.org/show_bug.cgi?id=1934361

    This can used to intercept traffic to Google from Edge and other Windows applications (except Chrome and Firefox). Hug-ops to Google folks.

    Microsoft are well aware of the extensive history of problems with this CA - I emailed them my concerns in 2021, and further issues were raised during a public CCADB discussion in 2022 - but they clearly don't care. I hope this incident prompts some change; Windows users deserve better!
    In conversation about a year ago from follow.agwa.name permalink

    Attachments


    1. No result found on File_thumbnail lookup.
      1934361 - ICP-Brasil: Mis-issued certificate
      UNCONFIRMED (nobody) in CA Program - CA Certificate Compliance. Last updated 2024-11-30.
  8. Embed this notice
    Andrew Ayer (agwa@follow.agwa.name)'s status on Tuesday, 12-Nov-2024 14:33:14 JST Andrew Ayer Andrew Ayer
    I looked into how non-browser clients that use the Mozilla root store (i.e. all of Linux) will handle the upcoming Entrust distrust, which is supposed to distrust certificates issued after November 30, 2024: https://sslmate.com/blog/post/entrust_distrust_more_disruptive_than_intended

    Spoiler: not well
    In conversation about a year ago from follow.agwa.name permalink

    Attachments

    1. Domain not in remote thumbnail source whitelist: sslmate.com
      The Entrust Distrust Will Be More Disruptive Than Intended
      from @SSLMate
      Non-browser clients don't properly handle the Distrust After date
  9. Embed this notice
    Andrew Ayer (agwa@follow.agwa.name)'s status on Tuesday, 12-Nov-2024 14:33:13 JST Andrew Ayer Andrew Ayer
    in reply to
    • Andrew Ayer

    As I expected, many clients will accept Entrust certificates issued after Nov 30. But to my surprise, several providers of PEM root bundles, notably Certifi/mkcert and curl, will begin automatically omitting Entrust roots after Nov 30 - meaning previously-issued Entrust certs will stop working! This is a complete misinterpretation of Mozilla's Distrust After attribute, and will cause unexpected breakage. I have opened bugs, but I expect other consumers have also misinterpreted Distrust After, so it would be prudent to replace existing Entrust certs.

    In conversation about a year ago from follow.agwa.name permalink
  10. Embed this notice
    Andrew Ayer (agwa@follow.agwa.name)'s status on Thursday, 01-Aug-2024 03:45:05 JST Andrew Ayer Andrew Ayer

    Cert Spotter lets you know if any of your certificates will be revoked in the upcoming DigiCert mass revocation. They appear in your Cert Spotter dashboard with the original expiration replaced by the revocation date.

    Handy, because if you log into your DigiCert account, they just give you a list of serial numbers and expect you to figure out what certs they correspond to.

    In conversation Thursday, 01-Aug-2024 03:45:05 JST from follow.agwa.name permalink

    Attachments


    1. https://follow.agwa.name/media/cdac27488266eb796cbee4eeb803f80e69aecfdce40352469be7255a1fda1fe1.png
  11. Embed this notice
    Andrew Ayer (agwa@follow.agwa.name)'s status on Friday, 03-Nov-2023 05:14:42 JST Andrew Ayer Andrew Ayer
    in reply to
    • Sexy Moon
    @Moon Certificate Transparency allows attacks to be detected, and then browsers can distrust the CA. This won't be possible in the EU if eIDAS passes.
    In conversation Friday, 03-Nov-2023 05:14:42 JST from follow.agwa.name permalink
  12. Embed this notice
    Andrew Ayer (agwa@follow.agwa.name)'s status on Thursday, 02-Nov-2023 23:38:12 JST Andrew Ayer Andrew Ayer
    The EU is considering a very bad law called eIDAS that would:

    - Force browsers to accept government certificate authorities

    - Ban additional security checks on certificates (such as Certificate Transparency) unless the EU agrees to them

    This would undo 10 years of improvements to encryption on the Web and create an environment very favorable to MitM attacks.

    If you're an EU citizen, consider writing to the MEP responsible for the eIDAS file, Romana JERKOVIĆ (https://www.europarl.europa.eu/meps/en/112747/ROMANA_JERKOVIC/home), to voice your concern.

    Learn more at https://last-chance-for-eidas.org/
    In conversation Thursday, 02-Nov-2023 23:38:12 JST from follow.agwa.name permalink

    Attachments

    1. Domain not in remote thumbnail source whitelist: last-chance-for-eidas.org
      Last Chance to fix eIDAS
      EU law agreed behind closed doors threatens Internet security
    2. Domain not in remote thumbnail source whitelist: www.europarl.europa.eu
      Home | Romana JERKOVIĆ | MEPs | European Parliament
      from @Europarl_EN
      Profile page - Romana JERKOVIĆ - Home
  13. Embed this notice
    Andrew Ayer (agwa@follow.agwa.name)'s status on Tuesday, 27-Jun-2023 04:40:14 JST Andrew Ayer Andrew Ayer
    Among the 300 DNS names still serving revoked and broken Let's Encrypt certificates (https://www.agwa.name/blog/post/last_weeks_lets_encrypt_downtime) I see:

    43 Squarespace sites
    14 Shopify sites
    4 GitHub Pages sites

    Alarming that such major Let's Encrypt integrations have no process for replacing revoked certificates.
    In conversation Tuesday, 27-Jun-2023 04:40:14 JST from follow.agwa.name permalink

    Attachments

    1. No result found on File_thumbnail lookup.
      The Story Behind Last Week's Let's Encrypt Downtime
      from @__agwa
      How I detected that Let's Encrypt issued 645 non-compliant certificates

User actions

    Andrew Ayer

    Andrew Ayer

    @agwa@agwa.nameBootstrapped founder of SSLMate (https://sslmate.com) and DNS Helper (https://www.dnshelper.com). Making SSL certificates and DNS records easier. #WebPKI and #CertificateTransparency research on the side.

    Tags
    • (None)

    Following 0

      Followers 0

        Groups 0

          Statistics

          User ID
          140092
          Member since
          26 Jun 2023
          Notices
          13
          Daily average
          0

          Feeds

          • Atom
          • Help
          • About
          • FAQ
          • TOS
          • Privacy
          • Source
          • Version
          • Contact

          GNU social JP is a social network, courtesy of GNU social JP管理人. It runs on GNU social, version 2.0.2-dev, available under the GNU Affero General Public License.

          Creative Commons Attribution 3.0 All GNU social JP content and data are available under the Creative Commons Attribution 3.0 license.