[Ach] Let's Encrypt + TLSA, DANE, HPKP, ... - was: bettercrypto.org certificate has expired today

Daniel Kahn Gillmor dkg at fifthhorseman.net
Tue Mar 14 03:21:59 CET 2017


On Wed 2017-03-08 11:06:05 -0500, Hanno Böck wrote:
> Changing keys regularly is imho a good thing, it gives you some kind of
> weak forward secrecy property. IMHO more valuable and less error prone
> than HPKP.

This isn't forward secrecy at all.  With modern TLS, the only mode is
forward secret.  What you're describing is active endpoint
impersonation.

> Imagine someone gets access to an old backup or harddisk of yours. If
> you regularly switch keys he won't get an active private key from you.
> If you reuse private keys he will.

This is a pretty narrow threat model, but i agree with you that it's
something that some people my find it worthwhile to consider.

however, a better approach would be a scheduled transition from one key
to the next, with an offline next-key introduced via hpkp before it is
deployed.  improving ACME clients to handle this kind of workflow in a
sane way by default would be very helpful.

     --dkg


More information about the Ach mailing list