joshbal4@m.fa.gl
replied 29 Dec 2023 13:53 +0000
in reply to: https://benjojo.co.uk/u/benjojo/h/bTCbN86pJz6hXWNJ13
whitequark@mastodon...
replied 29 Dec 2023 13:58 +0000
in reply to: https://benjojo.co.uk/u/benjojo/h/bTCbN86pJz6hXWNJ13
AmyZenunim@unstable...
replied 29 Dec 2023 14:31 +0000
in reply to: https://mastodon.social/users/whitequark/statuses/111664057231933054
coffee@mastodon.sand..
replied 29 Dec 2023 14:03 +0000
in reply to: https://benjojo.co.uk/u/benjojo/h/bTCbN86pJz6hXWNJ13
@benjojo We spent a lot of time debating whether to do intermediate preloading in Firefox… but Chrome followed AIA, and we didn’t want to do third party resource loads for TLS. I guess I missed the new behavior of Chrome, but it was always weird that it’d do AIA but not OCSP. Good lightning talk.
snowfox@tech.lgbt
replied 29 Dec 2023 14:43 +0000
in reply to: https://mastodon.sandwich.net/users/coffee/statuses/111664079380705900
@coffee @benjojo The argument is probably something like “AIA makes SSL errors go away (and a better internet experience means more ad money for us), isn’t a big privacy issue, and is highly cacheable and” vs. “OCSP is bad for privacy and doesn’t help for most leaf revocations”. Or just https://www.imperialviolet.org/2014/04/29/revocationagain.html ISTR Internet Explorer (Windows) filling in incomplete chains in the XP days, so it’s an old issue.
jorin@soc.punktrash...
replied 29 Dec 2023 14:07 +0000
in reply to: https://benjojo.co.uk/u/benjojo/h/bTCbN86pJz6hXWNJ13
@benjojo Ahh, I made this mistake not too long ago. It's pretty infuriating. I was using my cert for web and an application. So surely if the cert works in web but not in the application and I'm using a bog-standard LE cert, the issue has to be with the application, right? Because it works in the browser.
:)
annanannanse@mastodo..
replied 29 Dec 2023 14:17 +0000
in reply to: https://benjojo.co.uk/u/benjojo/h/bTCbN86pJz6hXWNJ13
@benjojo this is wild! i feel like i've the chrome behaviour at work for internal sites a couple of times (doesn't for colleague work, but works for me...)
penguin42@mastodon.o..
replied 29 Dec 2023 14:19 +0000
in reply to: https://benjojo.co.uk/u/benjojo/h/bTCbN86pJz6hXWNJ13
@benjojo Yes, it's a PITA; especially when I access sensitive sites in a freshly booted VM and it's not seen the cert from elsewhere. I've got at least a couple of banks and financial sites that do this.
hanno@mastodon.socia..
replied 29 Dec 2023 15:05 +0000
in reply to: https://benjojo.co.uk/u/benjojo/h/bTCbN86pJz6hXWNJ13
@benjojo doesn't chrome also do AIA fetching? (I.e. try to download the intermediate from the "CA Issuers" URL in the leaf cert.) I tried to analyze this a while ago, as it "looked like it might breed bugs", (but I haven't found any).
basisbit@chaos.socia..
replied 29 Dec 2023 16:04 +0000
in reply to: https://benjojo.co.uk/u/benjojo/h/bTCbN86pJz6hXWNJ13
@benjojo Can you recommend any documentation (for example using openssl tools) for how to check / get / extract /add the intermediate certificates from / to chains or certificate files?
jarednaude@infosec.e..
replied 29 Dec 2023 16:14 +0000
in reply to: https://benjojo.co.uk/u/benjojo/h/bTCbN86pJz6hXWNJ13
dana@tech.lgbt
replied 29 Dec 2023 16:19 +0000
in reply to: https://benjojo.co.uk/u/benjojo/h/bTCbN86pJz6hXWNJ13
@benjojo it gets worse, unfortunately. Firefox's first technique to deal with this was to cache intermediates from successful connections in case they'd ever be useful when a different server sent an incomplete chain. That leads to the same kind of inconsistent results you mentioned in Chrome. gross as it is, though, all that matters to the user is that the site loads, so... 🤷♀️
waldoj@mastodon.soci..
replied 29 Dec 2023 17:09 +0000
in reply to: https://mastodon.social/users/jamiemccarthy/statuses/111664789426331566
@jamiemccarthy @benjojo I worked a little bit on this ~5 years ago. GSA had recently started scanning all of .gov every day, looking for (among other things) TLS implementation failures, and providing a public record of the results. Regrettably, that was later made private and transferred to CISA along with control of the .gov TLD. IDK what CISA is doing now to communicate to .gov domain owners about that.
paolobarbolini@masto..
replied 29 Dec 2023 18:45 +0000
in reply to: https://benjojo.co.uk/u/benjojo/h/bTCbN86pJz6hXWNJ13
@benjojo this is completely nuts. This same mistake happened with a large company website here but I was fortunately able to convince the Twitter person over DMs by showing them sslabs results and they fixed it in a few hours. As you said browsers work, everything else doesn't so it's a big pain.
matthew@mastodon.me...
replied 29 Dec 2023 19:57 +0000
in reply to: https://benjojo.co.uk/u/benjojo/h/bTCbN86pJz6hXWNJ13
solarisfire@mast.sol..
replied 29 Dec 2023 22:00 +0000
in reply to: https://benjojo.co.uk/u/benjojo/h/bTCbN86pJz6hXWNJ13
KHoos@infosec.exchan..
replied 29 Dec 2023 23:05 +0000
in reply to: https://benjojo.co.uk/u/benjojo/h/bTCbN86pJz6hXWNJ13
@benjojo so browsers are too helpful with TLS. I understand the 'happy user' aspect (and the resulting "I don't see the same SSL error" reports) but I think security technology should fail / succeed in a way that can be reproduced!
benjojo
replied 31 Dec 2023 15:35 +0000
in reply to: https://is-a.cat/users/madargon/statuses/111675562871753123
@madargon Uhhh, if you are using your own CA then that can be quite a hard question to answer. If you have your certs directly signed by the CA, then you have no issue, you can serve the direct certificate and call it a day. IF you have a intermediate then you also need to provide the intermediate in the "full chain" that you provide to TLS servers, otherwise you are praying that Chrome (FireFox's logic wont save you here) will fix it for you (Not even sure it will), There are some extra caveats for AIA, but that quickly gets into a huge can of worms
madargon@is-a.cat
replied 08 Jan 2024 08:43 +0000
in reply to: https://toot.mirbsd.org/users/mirabilos/statuses/01HK090X93TZZQGXXPMBB9DPK8
@mirabilos @benjojo Update: Because my main server cert expired two days ago, I had to update it anyway. So this time I put only server cert and intermediate in the file for nginx. And was scared as hell something would stop working when root cert wouldn't be there. But everything seems to work correctly, my friends using my Matrix server didn't notice anything crashing
benjojo
replied 29 Dec 2023 20:05 +0000
in reply to: https://mastodon.sdf.org/users/pkw/statuses/111665145245865753
jhaar@mastodon.nz
replied 29 Dec 2023 20:24 +0000
in reply to: https://benjojo.co.uk/u/benjojo/h/zC2lNYNqr4Zmtw2Mqk