Ryan Dickson

42 posts

Ryan Dickson banner
Ryan Dickson

Ryan Dickson

@ryancdickson

Technical Program Manager at @GoogleChrome and hobbyist beekeeper. Tweets are my own, not my employer’s.

Reston, VA Katılım Aralık 2021
116 Takip Edilen224 Takipçiler
🧗‍♂️ Matt Holt
When specifying a certificate lifetime (in code), would you rather specify a duration (from time of issuance) or a specific NotAfter date?
English
7
0
0
1.5K
Ryan Dickson
Ryan Dickson@ryancdickson·
@__apf__ She’s just trying to get buzzed in! Looks like a honeybee, who will be responsible for producing 1/12 of a teaspoon of honey in her ~45 day lifetime! Un-bee-lievable!
English
0
0
2
76
Adriana Porter Felt
Adriana Porter Felt@__apf__·
a bee keeps ringing my doorbell. what do you think she wants from me
Adriana Porter Felt tweet mediaAdriana Porter Felt tweet media
English
69
185
3.3K
141.3K
Ryan Dickson
Ryan Dickson@ryancdickson·
@rmhrisk Ran it against Let’s Encrypt, SSL.com, ZeroSSL, BuyPass, and Google Trust Services moments after getting his email! Thank you Andrew, indeed!
English
0
0
2
183
Ryan Hurst
Ryan Hurst@rmhrisk·
I've long argued that root programs should mandate the adoption of ACME, allowing them, and ideally, the public, to assess the conformity of public CAs using standard tools. These entities serve the web, yet much of their operations remain opaque, and we know there be dragons. We can, and should, strive for more transparency in the operations of public CAs.
English
1
3
7
1.1K
Ryan Hurst
Ryan Hurst@rmhrisk·
It looks like @__agwa has given the WebPKI another gift. His new tool dcv-inspector.com allows you to easily inspect the DNS, HTTP, and SMTP requests made by a certificate authority during domain validation. This is significant not only because we know some CAs fail to implement existing required practices, but it also provides insights into the efforts of some CAs to protect against BGP-based attacks on certificate issuance. Here's an example response showing what the service detects in a Let's Encrypt enrollment: dcv-inspector.com/test/46e4bd9d8…. #TheWebThanksYouAgwa
English
1
14
30
6.3K
David Adrian
David Adrian@dadrian·
HOW TO CONFIGURE A PKI 1. Don't.
English
5
1
19
1.5K
Ryan Dickson retweetledi
Ryan Hurst
Ryan Hurst@rmhrisk·
Do you use ACME in a enterprise or large scale service and would be willing to be quoted on a site focused on increasing ACME adoption about your experience? If so please DM me and I’ll share more context.
English
0
10
3
3.7K
Ryan Dickson
Ryan Dickson@ryancdickson·
@mholt6 This is my fourth year. It’ll be a lifelong hobby.
English
0
0
2
36
Ryan Dickson
Ryan Dickson@ryancdickson·
It’s been an un-bee-lievable year for beekeeping. So far, I’ve pulled almost 300 pounds (about 25 gallons) of honey from two hives - and there’s still a few weeks left in the season!
English
1
0
11
731
Ryan Hurst
Ryan Hurst@rmhrisk·
Google Trust Services has announced their support of ARI! ARI enables notification that your cert will be revoked before it happens so you renew before it impacts you. With client support this means GTS customers have one less risk to worry about. security.googleblog.com/2023/05/google…
English
2
10
31
4.6K
Matthew Garrett (@mjg59@nondeterministic.computer)
@ryancdickson Is the interaction between Chrome and the Windows certificate providers documented anywhere? Just spent a bunch of time figuring out that apparently Chrome only uses the current user store, not the machine-wide one
English
1
0
0
104
Ryan Dickson
Ryan Dickson@ryancdickson·
@seakoz @elonmusk Don’t forget to practice “defense-in-depth” by also storing the hashes and notAfter dates in a poorly named spreadsheet owned by the Admin who was replaced “5 admins ago.” 🤓
English
0
0
2
83
Ryan Dickson retweetledi
Elon Musk
Elon Musk@elonmusk·
Caused by expired ground station cert. We’re scrubbing the system for other single-point vulnerabilities.
English
1.2K
1K
16.9K
5.4M
Ryan Dickson
Ryan Dickson@ryancdickson·
@jozefizso Not everyone supports automation to the extent that “short-lived” certificates can be the norm. However, we’re trying to incentivize their use within the CA/Browser Forum (github.com/cabforum/serve…).
English
0
0
1
522
Jozef Izso
Jozef Izso@jozefizso·
@ryancdickson Why 90 days when it’s automated? 30 days? 14 days? 48 hours?
English
1
0
0
592
Ryan Dickson
Ryan Dickson@ryancdickson·
@awakecoding @BoreanJordan Root programs (like Chrome’s) define expectations and minimum requirements for initial and continued inclusion of a certificate in the corresponding root store (e.g., chromium.org/Home/chromium-…). Those requirements are defined at the program operator’s sole discretion.
English
1
0
1
76
Marc-André Moreau
Marc-André Moreau@awakecoding·
@BoreanJordan @ryancdickson Agreed, but I suspect these trusted CAs will smell the existential threat and lobby against lowering the maximum WebPKI server certificate validity time to 90 days, as it will effectively put a lot of them out of business, as they'll struggle to bring value to their customers
English
1
0
0
117