468 points by jaas 1 day ago | 258 comments | View on ycombinator
ivanr 1 day ago |
rsync 1 day ago |
A properly configured DoH server (perhaps running unbound) with a properly constructed configuration profile which included a DoH FQDN with a proper certificate would not work in iOS.
The reason, it turns out, is that iOS insisted that both the FQDN and the IP have proper certificates.
This is why the configuration profiles from big organizations like dns4eu and nextdns would work properly when, for instance, installed on an iphone ... but your own personal DoH server (and profile) would not.
midtake 1 day ago |
- 8 is a lucky number and a power of 2
- 8 lets me refresh weekly and have a fixed day of the week to check whether there was some API 429 timeout
- 6 is the value of every digit in the number of the beast
- I just don't like 6!
charcircuit 1 day ago |
gruez 1 day ago |
I think acme.sh supports it though.
cryptonector 1 day ago |
qwertox 1 day ago |
This is no criticism, I like what they do, but how am I supposed to do renewals? If something goes wrong, like the pipeline triggering certbot goes wrong, I won't have time to fix this. So I'd be at a two day renewal with a 4 day "debugging" window.
I'm certain there are some who need this, but it's not me. Also the rationale is a bit odd:
> IP address certificates must be short-lived certificates, a decision we made because IP addresses are more transient than domain names, so validating more frequently is important.
Are IP addresses more transient than a domain within a 45 day window? The static IPs you get when you rent a vps, they're not transient.
xg15 1 day ago |
iamrobertismo 1 day ago |
apitman about 20 hours ago |
As a concrete example, I'll probably be able to turn off bootstrap domains for TakingNames[0].
razakel 1 day ago |
josephernest about 12 hours ago |
cryptonector 1 day ago |
nkmnz about 11 hours ago |
meling 1 day ago |
6thbit 1 day ago |
cedws 1 day ago |
undefined about 17 hours ago |
zamadatix 1 day ago |
rubatuga 1 day ago |
hojofpodge 1 day ago |
If you are supposed to have an establishable identity I think there is DNSSEC back to the registrar for a name and (I'm not quite sure what?) back to the AS.for the IP.
bflesch 1 day ago |
But what risks are attached with such a short refresh?
Is there someone at the top of the certificate chain who can refuse to give out further certificates within the blink of an eye?
If yes, would this mean that within 6 days all affected certificates would expire, like a very big Denial of Service attack?
And after 6 days everybody goes back to using HTTP?
Maybe someone with more knowledge about certificate chains can explain it to me.
MORPHOICES about 23 hours ago |
notepad0x90 1 day ago |