Am 2017-03-08 16:32, schrieb Hanno Böck:
This is one of the reasons why these days I tend to advise against HPKP
with the exception of high risk sites. There's just far too much that
can go wrong with HPKP.

Several possibilities to handle this risk:

Use Let's Encrypt with your custom CSR, recycle your CSR when renewing (which means reusing the KeyPair). No changes in TLSA-Records or HPKP needed, because stable Keypair.

If you used the certbot to create everything for you, you can still switch to CSR-Mode as long as you have access to your Pub/Priv-RSA-Keypair of your current certificate.

When you like to Change the Keypair:
1) do it early, so you have time to insert additional HPKP and TLSA entrys 2) do it with the prepared spare-Key. HPKP enforces you to have a Backup-Keypair, only pinning one PubKey doesn't work, RFC says you have to have at least one Backup Key pinned which is currently unused. Browsers don't enforce the HPKP-mechanism if you don't use an unused Backup-Key (at least I checked this with Chrome and Firefox).

But I agree with Hanno: If you feel uncomftable to handle this technology right, better don't use it. High chance something goes wrong, because not doing it the right way.
_______________________________________________
Ach mailing list
[email protected]
http://lists.cert.at/cgi-bin/mailman/listinfo/ach

Reply via email to