pull down to refresh

A nation state with control over a Certificate Authority could create SSL certs for any domain and easily perform a MITM. That's the risk.
First idea that comes to mind to mitigate it, would be to at least pin domains to CAs so that a random CA controlled by a nation state can't issue a new certificate for any domain without going unnoticed.
This might be overkill and apparently is not a good idea:
  • PKI has significantly improved - browser vendors (Google, Mozilla, Apple, Microsoft) now strictly control CA trust stores and remove non-compliant CAs
  • Certificate Transparency - all certificates must be publicly logged, making rogue certificates detectable
  • CAA records - DNS records that specify which CAs can issue certificates for a domain
  • Pinning creates major operational risks - misconfigured pins can cause complete outages that are difficult to recover from
But just out of curiosity, I'm trying a Firefox add-on that notifies you every time something changes in the certificate of a website that you had already visited. It can be configured to only notify you on a change of the issuer. So if a website goes from Let's Encrypt CA to CCP CA, you should worry xD