Welcome
|
FAQ
|
Downloads
|
Wiki
Tiny Core Linux
Welcome,
Guest
. Please
login
or
register
.
Did you miss your
activation email
?
1 Hour
1 Day
1 Week
1 Month
Forever
Login with username, password and session length
News:
Need an
Introduction
to Tiny Core? Or peruse
Core Concepts
.
Home
Help
Login
Register
Tiny Core Linux
»
Off-Topic
»
Off-Topic - Tiny Core Lounge
»
Addressing the unauthorized issuance of multiple TLS certificates for 1.1.1.1
« previous
next »
Print
Pages: [
1
]
Go Down
Author
Topic: Addressing the unauthorized issuance of multiple TLS certificates for 1.1.1.1 (Read 54 times)
gadget42
Hero Member
Posts: 934
Addressing the unauthorized issuance of multiple TLS certificates for 1.1.1.1
«
on:
September 05, 2025, 02:48:07 AM »
Addressing the unauthorized issuance of multiple TLS certificates for 1.1.1.1
https://blog.cloudflare.com/unauthorized-issuance-of-certificates-for-1-1-1-1/
regardless of opinions of/on Cloudflare, their incident reports are very insightful, informative, and professional
also of potential interest:
https://groups.google.com/a/mozilla.org/g/dev-security-policy/c/SgwC1QsEpvc
https://crt.sh/
https://radar.cloudflare.com/certificate-transparency
https://www.reddit.com/r/dns/comments/1fv5f9u/what_dns_do_you_recommend_1111_vs_9999_vs_opendns/
footnote/sidenote: originally saw this via arstechnica rss feed but at time of posting their website is down for maintenance
here is the arstechnica url:
https://arstechnica.com/security/2025/09/mis-issued-certificates-for-1-1-1-1-dns-service-pose-a-threat-to-the-internet/
Logged
** WARNING: connection is not using a post-quantum kex exchange algorithm.
** This session may be vulnerable to "store now, decrypt later" attacks.
** The server may need to be upgraded. See
https://openssh.com/pq.html
Print
Pages: [
1
]
Go Up
« previous
next »
Tiny Core Linux
»
Off-Topic
»
Off-Topic - Tiny Core Lounge
»
Addressing the unauthorized issuance of multiple TLS certificates for 1.1.1.1