Texas considers banning products infused with THC derived from hemp, and retailers are worried
Texas lawmakers have approved banning gummies, drinks and vapes infused with THC, the compound that gives marijuana its psychoactive properties.
More results...
Texas lawmakers have approved banning gummies, drinks and vapes infused with THC, the compound that gives marijuana its psychoactive properties.
“Space Systems Command intends to award a second vendor, but the quantity will depend on the selected vendor’s proposal. The timing and scope of that award is subject to the outcomes of the on-going FY26 budget deliberations,” Col. Rob Davi…
Brody Ford / Bloomberg:
HPE reports Q2 revenue up 6% YoY to $7.63B, vs. $7.46B est., Server revenue up 6% YoY to $4.1B, and says it expects a reduced impact from tariffs this year — Hewlett Packard Enterprise Co. reported quarterly …
After being on opposite sides of Syria’s war, former regime firefighters and members of the White Helmets in a Damascus firehouse are learning to trust each other and work side-by-side.
The Navy Secretary this week said the Trump administration’s Department of Government Efficiency (DOGE) initiative has helped the Navy save hundreds of millions of dollars by canceling various contracts. “We’ve […]
Timing of announcement on ship named after prominent gay rights activist and veteran is intentional, reports sayThe US defense secretary, Pete Hegseth, has ordered the US navy to strip the name of prominent gay rights activist and navy veteran Harvey M…
TL;DR: Built a mathematical solution that cuts CA compromise response time from months to 2 hours. Just submitted to IETF. Watch them discuss it for 10+ years while dozens more DigiNotars happen.
Working on a DNS-Security project, I realized something absolutely bonkers:
Nuclear power plants have SCRAM buttons. Airplanes have emergency procedures. The global PKI that secures the entire internet? Nope. If a Root CA gets pwned, we basically call everyone manually and hope for the best.
This problem has existed for 25+ years – since X.509 PKI was deployed in the 1990s. Every security expert knows it. Nobody fixed it.
When DigiNotar got hacked in 2011:
Here’s why nobody solved this:
“You can’t revoke a trusted Root CA certificate, because it is self-signed by the CA and therefore there is no trusted mechanism by which to verify a CRL.” – Stack Overflow PKI experts
The fundamental issue: Root CAs are trusted a priori – there’s no higher authority to revoke them. If attackers compromise the private key, any “revocation CRL” would be signed by that same compromised key. Who do you trust?
For SubCAs: Manual coordination between Root CA and SubCA operators takes weeks while the compromise spreads through the hierarchy.
The PKI community literally accepted this as “architecturally impossible to solve.” For 25 years.
But what if we make attackers help us solve their own paradox?
What if we design the system so that using the compromised key aggressively eventually triggers the CA’s unavoidable suicide?
Fun fact: I originally wanted to call this the T800-Extension (Terminator-style “self-termination”), but I figured that would just cause trademark trouble. So for now it’s the RTO-Extension aka RTO-CRL aka Root-TurnOff CRL – technically correct and legally safe! 🤖
I call it Certificate Authority Self-Revocation. Here’s the elegant part:
I solved the “unsolvable” problem: Attackers can compromise a CA, but using it aggressively triggers that CA’s mathematically unavoidable RTO-CRL suicide while other CAs remain operational.
Just submitted draft-jahnke-ca-self-revocation-04 to IETF:
Maximum exposure: 2 hours vs current 2+ months
Attacker without CA key:
Attacker with CA key:
Attackers face impossible economics:
Here’s what pisses me off:
The system is optimized for reacting to disasters instead of preventing them entirely.
For the technical details, I’ve submitted the complete specification to the IETF as draft-jahnke-ca-self-revocation-04. It includes:
The mathematical proof is solid: attackers with CA private keys can either use them conservatively (low impact) or aggressively (triggering RTO-CRL self-termination). Either way, the attack becomes economically unattractive and time-limited.
Every PKI expert reading this knows the Root CA revocation problem is real and “architecturally impossible.” My RTO-Extension mathematical solution is elegant, implementable, and desperately needed.
So why will this take 10+ years to standardize while the next CA compromise gets patched in 2 days?
Because fixing symptoms gets panic-priority, but solving “impossible” architectural problems gets committee-priority.
The system is optimized for reacting to disasters instead of preventing them entirely.
We’ve been accepting months-long CA compromise windows as “just how PKI works.”
It doesn’t have to be this way.
The RTO-Extension math is sound. The implementation is ready. The only missing piece is urgency.
How many more DigiNotars before we solve the “unsolvable” problem?
EDIT: Holy shit, front page! Thanks for the gold!
For everyone asking “why didn’t [big company] build this” – excellent question. My theory: they profit more from selling incident response than preventing incidents entirely.
EDIT 2: Yes, I know about Certificate Transparency. CT is detection after damage. The RTO-Extension is prevention before damage. Different problems.
EDIT 3: To the person who said “just use short-lived certificates” – sure, let me call every embedded device manufacturer and ask them to implement automatic renewal. I’ll wait.
Currently building the RTO-Extension into the keweonDNS project. If you want to see a PKI with an actual emergency stop button, stay tuned.
Special thanks to my forum users at XDA-Developers – without you, this fundamental flaw would have never been spotted. Your sharp eyes and relentless questioning made this discovery possible!
Reagan-appointed judge blocks prison officials from enforcing Trump’s executive order targeting trans people.
Lee Jae-myung’s path to the presidency is marked by hardship and controversy. A former child laborer with a disabling arm injury, he survived a suicide attempt, pushed through university, and rose through the political ranks—despite surviving a stabbi…
The former White House government efficiency czar has repeatedly slammed the legislation as wasteful
Read Full Article at RT.com