Revocation of X.509 Certificates

Who yanks your browser padlock? Readers cry “AI,” rebels want a new system

TLDR: New rules from industry groups and Let’s Encrypt change how website security certificates get revoked. Comments erupt: some accuse the post of AI vibes, others push a domain-system alternative that’s hard to deploy, and many warn that concentrating trust in a few hands is a dangerous power shift.

A sober blog on certificate revocation — the rules for when a website’s digital “ID card” gets yanked — turned into a popcorn-worthy brawl. The post says new moves by the CAB Forum and Let’s Encrypt change how trust works online, which sounds dry… until the comments exploded. One reader flat-out asked if the whole thing was AI-written, accusing it of looping arguments and confusion. Others sparred over a simple-sounding question: when a site’s ID looks sketchy, should the website cut the connection, or should your browser decide? Cue the “who gets the red button” debate.

Then came the alternative crowd. “Just use DANE,” someone said — a system that ties trust to the domain system via DNSSEC. But fans quickly ran into reality: as user thayne put it, DNSSEC is rare, fiddly, and easy to break in production. Meanwhile, skeptics waved the centralization flag: between PKI and DNS, whoever controls the keys controls the internet. A few jokers called OCSP “calling mom for permission,” and mocked the padlock icon as “security theater.”

Bottom line: the article tried to explain revocation changes; the crowd turned it into a trust cage match, complete with AI call-outs, “use DANE!” chants, and doomsaying about a handful of gatekeepers running the web.

Key Points

  • The article revisits domain name certificate revocation due to recent changes by the CA/Browser Forum and Let’s Encrypt.
  • PKI enables trusted communications via transitive trust, with X.509 certificates binding identities to public keys.
  • X.509 certificates provide authenticity, verifiability, attribution, and support encrypted sessions via TLS.
  • Web use of TLS/HTTPS ensures confidentiality, integrity, and non-repudiation of transactions.
  • Certificates are time-bounded by notBefore and notAfter fields, underscoring that trust is not perpetual.

Hottest takes

"Was this AI-generated?" — lmm
"At this point, why not just use DANE" — thayne
"Take over both of them, and you have the whole net under your command" — bblb
Made with <3 by @siedrix and @shesho from CDMX. Powered by Forge&Hive.