Hacker News new | past | comments | ask | show | jobs | submit login

What happens if both DNS requests are hijacked? Could an attacker return both a different IP and a different public key that correspond to a malicious server?

Edit: I should clarify, I think the issue stems from DNS being a potential attack vector itself. You can't blindly trust what DNS tells you. This is precisely the problem that certificate chains (issued by a trusted third party) purport to resolve-- one of trust.




Well there's DNSSEC. Implementation details (such as lack of practice in key rotation, TTL, etc) aside, DNSSEC works and LetsEncrypt validates it.

Then there is Certificate Transparency logs. It will be passive action at this point, but it's an action regardless.

Let's Encrypt checks DNS validation and DNS CAA from multiple PoPs, but I don't think it's enforced by CA/B requirements to do so (happy to be corrected).




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: