WelcomeWelcome | FAQFAQ | DownloadsDownloads | WikiWiki

Author Topic: Addressing the unauthorized issuance of multiple TLS certificates for 1.1.1.1  (Read 54 times)

Offline gadget42

  • Hero Member
  • *****
  • Posts: 934
Addressing the unauthorized issuance of multiple TLS certificates for 1.1.1.1

https://blog.cloudflare.com/unauthorized-issuance-of-certificates-for-1-1-1-1/

regardless of opinions of/on Cloudflare, their incident reports are very insightful, informative, and professional

also of potential interest:

https://groups.google.com/a/mozilla.org/g/dev-security-policy/c/SgwC1QsEpvc

https://crt.sh/

https://radar.cloudflare.com/certificate-transparency

https://www.reddit.com/r/dns/comments/1fv5f9u/what_dns_do_you_recommend_1111_vs_9999_vs_opendns/

footnote/sidenote: originally saw this via arstechnica rss feed but at time of posting their website is down for maintenance

here is the arstechnica url:
https://arstechnica.com/security/2025/09/mis-issued-certificates-for-1-1-1-1-dns-service-pose-a-threat-to-the-internet/
** WARNING: connection is not using a post-quantum kex exchange algorithm.
** This session may be vulnerable to "store now, decrypt later" attacks.
** The server may need to be upgraded. See https://openssh.com/pq.html