frontpage.
newsnewestaskshowjobs

Made with ♥ by @iamnishanth

Open Source @Github

How to find a job in tech in 2025

https://vibeinterview.com/blog/how-to-find-a-job-in-tech-in-2025
2•egze•3m ago•0 comments

Show HN: Deglaze Me – A Chrome extension to strip the sycophancy from ChatGPT

https://github.com/althea-tfyqa/deglaze-me
1•althea_tx•3m ago•0 comments

Show HN: Delfyn, AI Agent to help businesses get paid faster

https://www.delfyn.co/
1•jhack88•3m ago•0 comments

Anthropic destroyed print books to build its AI models

https://arstechnica.com/ai/2025/06/anthropic-destroyed-millions-of-print-books-to-build-its-ai-models/
1•bayindirh•3m ago•0 comments

US Warns of Rising Iranian Cyberattack Threats

https://digitrendz.blog/newswire/technology/20019/us-warns-of-rising-iranian-cyberattack-threats/
3•cyberwaj•3m ago•0 comments

Thought Anchors: Which LLM Reasoning Steps Matter?

https://arxiv.org/abs/2506.19143
1•jag729•3m ago•0 comments

Microplastic contaminations in a set of beverages sold in France

https://www.sciencedirect.com/science/article/pii/S0889157525005344
2•littlexsparkee•7m ago•1 comments

Is the US Stock Market open?

https://is-market-open.com/
1•godcrampy•9m ago•0 comments

Satya Nadella: Microsoft's AI Bets, Hyperscaling, Quantum Breakthroughs [video]

https://www.youtube.com/watch?v=AUUZuzVHKdo
1•sandslash•9m ago•0 comments

Iran is Losing the Fight to Turn Off Starlink Satellites

https://www.bloomberg.com/news/newsletters/2025-06-25/iran-fights-to-turn-off-elon-musk-s-satellites
1•alephnerd•11m ago•1 comments

40k-year-old mammoth tusk boomerang is oldest in Europe

https://www.livescience.com/archaeology/40-000-year-old-mammoth-tusk-boomerang-is-oldest-in-europe-and-possibly-the-world
1•geox•14m ago•0 comments

Podcast Fact Checking App – BS Meter

https://bsmtr.com/
2•tycoop81•15m ago•1 comments

Show HN: MCP Server for Tally – Create and Manage Forms with Claude

https://github.com/learnwithcc/tally-mcp
1•cryophobic•15m ago•0 comments

John Carmack's Most Important Lesson: Gratitude (2000)

https://github.com/oliverbenns/john-carmack-plan/blob/master/archive/2000-03-27.md
1•platunit10•16m ago•0 comments

Ingredients of a Great Fundraising Announcement

https://www.getflack.com/p/nail-your-fundraising-announcement
1•gk1•18m ago•0 comments

Trapping AI

https://algorithmic-sabotage.github.io/asrg/trapping-ai/
2•smartmic•18m ago•0 comments

The static spin illusion (Illusion of the year contest)

https://www.youtube.com/watch?v=qk0L6LT_ivo
2•sircalvin•18m ago•0 comments

Show HN: I automated SEO content creation for $0.06 per piece (1-hour build)

https://twitter.com/GashiDite/status/1937969499312980404
1•ditegashi•18m ago•0 comments

GPT Island – adds a chatbar to bottom of every page – extension

https://chromewebstore.google.com/detail/gpt-island-🏝️-the-most-b/ooohpemfdkijlakokkfliajibiiiagnm
1•alanrigby•19m ago•1 comments

Ancient DNA Reveals Humans in Colombia with No Genetic Ties to People Today

https://www.smithsonianmag.com/smart-news/ancient-dna-reveals-mysterious-new-group-of-humans-in-colombia-with-no-genetic-ties-to-people-today-180986819/
1•noleary•19m ago•0 comments

China's Quantum Computer Cracks RSA Encryption, Risks Global Security

https://digitrendz.blog/newswire/technology/20428/chinas-quantum-computer-cracks-rsa-encryption-risks-global-security/
3•cyberkar•21m ago•2 comments

Show HN: Similarity trait Rust crate for matching, correlation, distance, etc.

https://github.com/SixArm/similarity-trait-rust-crate
1•jph•21m ago•0 comments

Sensirion SEN66 Environmental Air Quality Sensor

https://blog.adafruit.com/2025/05/08/eye-on-npi-sensirion-sen66-environmental-sensor-node-eyeonnpi-digikey-digikey-sensirion-adafruit/
2•stacktrust•22m ago•0 comments

Anthropic wins fair use victory for AI – but still in trouble for stealing books

https://simonwillison.net/2025/Jun/24/anthropic-training/
3•taubek•25m ago•0 comments

Cosmoe: New C++ toolkit for building native Wayland apps

https://www.theregister.com/2025/06/25/cosmoe_new_cpp_toolkit/
3•LorenDB•25m ago•0 comments

Arithmetic with Continued Fractions

https://perl.plover.com/yak/cftalk/
1•fanf2•27m ago•0 comments

Show HN: Built my first web app – AI image generator to fix bad Tinder pics

https://vibeflirting.com/
1•rjyoungling•28m ago•0 comments

How can I resize an Image respecting COCO format to go along with it

1•pirimi•31m ago•0 comments

Google Project VOICE: Using LLMs to help the speech-disabled [video]

https://www.youtube.com/watch?v=U-twTRUItjY
1•nostrademons•31m ago•0 comments

Tesla sedan hit by train after self-driving error in Berks County, stops train

https://www.wfmz.com/news/area/berks/tesla-sedan-hit-by-train-after-self-driving-error-in-berks-county-stops-train-traffic/article_aa1cbbf4-7918-4379-b557-da80f9596103.html
8•airhangerf15•32m ago•0 comments
Open in hackernews

Getting ready to issue IP address certificates

https://community.letsencrypt.org/t/getting-ready-to-issue-ip-address-certificates/238777
164•Bogdanp•4h ago

Comments

zaik•4h ago
Interesting. I wonder if XMPP federation would work with such a certificate.
giancarlostoro•3h ago
Are there public XMPP servers using just the IP for the host? Never heard of this, I could see this being the case internally.
smallnix•3h ago
Is this for ipv4 and ipv6?
jaas•3h ago
It will work for both.
mocko•3h ago
I can see how this would work on a technical level but what's the intended use case?
throitallaway•3h ago
I'm guessing mostly hobbyists and one-off use cases where people don't care to associate a hostname to a project.
BiteCode_dev•3h ago
Static ip for self hosting at home
politelemon•3h ago
The validity is just 6 days, so I'd assume it's not for long lived use cases? Or am I misunderstanding something
meepmorp•3h ago
they're only for publicly accessible IP addresses, so they'd work the same as regular letsencrypt certs - get a new one when the old one expires.
remram•13m ago
You can point a name at your home IP just as easily as any other IP.
ff317•3h ago
It might be interesting for "opportunistic" DoTLS towards authdns servers, which might listen on the DoTLS port with a cert containing a SAN that matches the public IP of the authdns server. (You can do this now with authdns server hostnames, but there could be many varied names for one public authdns IP, and this kinda ties things together more-clearly and directly).
jeroenhd•3h ago
It might also he useful to hide the SNI in HTTPS requests. With the current status of ESNI/ECH you need some kind of proxy domain, but for small servers that only host a few sites, every domain may be identifiable (as opposed to, say, a generic Cloudflare certificate or a generic Azure certificate).
bongodongobob•3h ago
Pretty common to have appliances without DNS entries in infra is my guess, I could def make use of this at work.
Hizonner•1h ago
You're not going to be able to get a cert for any address that's not both (a) global, and (b) actually reachable from the Internet.
teaearlgraycold•3h ago
Not common, but there is the use case of vanity IPs. The cert for https://1.1.1.1 is signed for the IP as well as the domain name one.one.one.one
szszrk•3h ago
Sometimes you want to have valid certs while your dns is undergoing major redesign. For instance to keep your dashboards available, or to be triple sure no old automation will fail due to dns issues.

In other cases dns is just not needed at all. You might prefer simplicity, independence from dns propagation, so you will have your, say, Cockpit exposed instantly on a test env.

Only our imagination limits us here.

Hizonner•3h ago
So go to keys-are-names.

There's no reason AT ALL to bring IP addresses into the mix.

szszrk•3h ago
> So go to keys-are-names.

Elaborate, please.

> There's no reason AT ALL to bring IP addresses into the mix.

Not sure what scenario you are talking about, but IPs are kind of hard to avoid. DNS is trivial to avoid - you can simply not set it up.

"bringing IPs into the mix" is literally the only possible option.

Hizonner•2h ago
>> So go to keys-are-names.

> Elaborate, please.

Identify a service directly by its crypto key. When you configure something else to connect to it, treat the IP address as a hint, not the primary identifier for what it's talking to. Standard idiom.

... and before you tell me that that's infeasible because you'd have to modify software, go do a survey of all the code out there, and see how much of it supports IP address certificates. If you're moving around the parts of some big complex system, it's pretty much guaranteed that many of those parts are going to choke if you just blindly go and stick IP addresses in https:// URLs.

And if you're fixing the software anyway, then it's not sane to "fix" it to attach identity to something you're going to want to change all the time, like an IP address. Especially if they're global addresses (which are the only ones any Let's Encrypt or any other public CA is ever going to certify) in the IPv4 space (which is the only one any "enterprise" ever seems willing to use).

freeone3000•2h ago
The BSD networking stack treats an IP addr as a valid hostname for hostname resolution. As such, every phone, tablet, and computer able to do TLS by hostname can do it by IP. Try it out! Self-sign an IP certificate and try it on your local net. If you put it in the trust store, it’ll validate just fine. The only barrier to adoption was CAs refusing to issue IP certificates at large.
Hizonner•2h ago
Um, the BSD networking stack I'm familiar with doesn't include TLS or X.509 validation at all. The question isn't what you get from gethostbyname. It's what you get when you hand that to your X.509 validator.
mananaysiempre•2h ago
Noot quite. DNS hostnames and IP addresses are encoded differently in X.509 certs: one is the dNSName option of the GeneralName choice type in the subjectAltName extension[1], the other is the iPAddress option. (And before you ask, tagging a stringified IP address quad as a dNSName is misissuance per the CA/Browser Forum Baseline Requirements[2] and liable to get your CA kicked from certificate stores. Ambiguous encodings are dangerous.) So some explicit support from the TLS library is indeed required. But I’m indeed not aware of many apps having problems with IP address certs.

[1] https://datatracker.ietf.org/doc/html/rfc5280#section-4.2.1....

[2] https://cabforum.org/working-groups/server/baseline-requirem...

szszrk•1h ago
> go do a survey of all the code out there, and see how much of it supports IP address certificates.

I've been doing that for years on onprem (~60% old "enterprise/legacy" ~40% modern stuff) and never seen anything that doesn't support it. YMMV, but if all I work with supports it, I won't complain in vain.

> those parts are going to choke if you just blindly go and stick IP addresses in https:// URLs.

I did many times, seems that legacy heavens were always kind to me in this regard.

> something you're going to want to change all the time, like an IP address

That's a personal assumption as well. If your architectures change IPs all the time, OK. Ones I worked with didn't. Always had plenty of components with IPs that didn't changed in a decade or two. Even my two previous local ISPs I had gave me "dynamic public IP" and kept them for many years. For some companies changing an ip of their main firewalls/load balancers or VPN servers is unthinkable.

Even on my last project on Public Cloud, the first thing I did was to make sure public IPs won't be dynamic (will survive recreation of services) so I don't have to deal with consequences of my corporate client endpoints and proxies flushing DNS caches randomly. (don't ask me why, but even huge companies still use proxies on a large scale. Good luck with figuring out when such proxy invalidates your DNS record).

> in the IPv4 space

IPv6 is here. Your printer and light bulb will want a cert as well.

move-on-by•3h ago
Plenty of other responses with good use cases, but I didn’t see NTS mentioned.

If you want to use NTS, but can’t get an IP cert, then you are left requiring DNS before you can get a trusted time. If DNS is down- then you can’t get the time. A common issue with DNSSEC is having the wrong time- causing validation failures. If you have DNSSEC enforced and have the wrong time- but NTS depends on DNS, then you are out of luck with no way to recover. Having IP as part of your cert allows trusted time without the DNS requirement, which can then fix your broken DNSSEC enforcement.

Hizonner•2h ago
How are you going to validate an X.509 certificate if you don't know the time?
move-on-by•48m ago
Oh this is a good point! Looking at my DNSSEC domain (hosted by CloudFlare) on https://dnssec-debugger.verisignlabs.com - the Inception Time and Expiration Time seems to be valid for... 3.5 days? This isn't something I look at much, but I assume that is up to the implementation. The new shortlived cert is valid for 6 days. So, from a very rough look, I expect X.509 certificate is going to be less time sensitive then DNSSEC - but only by a few days. Also, very likely to depend on implementation details. This is a great point.
codys•2h ago
this seems possible to avoid as an issue without needing IP certs by having the configuration supply both an IP and a hostname, with the hostname used for the TLS validation.
move-on-by•38m ago
Yes, that is absolutely possible, but doesn't mean that will be the default. I commented recently [0] about Ubuntu's decision to have only NTS enabled (via domain) by default on 25.10. It begs the question how system time can be set if the initial time is outside of the cert's validity time-frame. I didn't look, but perhaps Chrony would still use the local network's published NTP servers.

[0]: https://news.ycombinator.com/context?id=44318784

infogulch•2h ago
Just ESNI/ECH is a big deal.

I recall one of the main arguments against Encrypted server name indication (ESNI) is that it would only be effective for the giant https proxy services like Cloudflare, that the idea of IP certs was floated as a solution but dismissed as a pipe dream. With IP address certificates, now every server can participate in ESNI, not just the giants. If it becomes common enough for clients to assume that all web servers have an IP cert and attempt to use ESNI on every connection, it could be a boon for privacy across the internet.

duskwuff•2h ago
> If it becomes common enough for clients to assume that all web servers have an IP cert

That's never going to be a safe assumption; private and/or dynamically assigned IP addresses are always going to be a thing.

Hizonner•2h ago
So is this the flow?

1. Want to connect to https://www.secret.com.

2. Resolve using DNS, get 1.2.3.4

3. Connect to 1.2.3.4, validate cert

4. Send ESNI, get separate cert for www.secret.com, validate that

... and the threat you're mitigating is presumably that you don't want to disclose the name "www.secret.com" unless you're convinced you're talking to the legitimate 1.2.3.4, so that some adversary can't spoof the IP traffic to and from 1.2.3.4, and thereby learn who's making connections to www.secret.com. Is that correct?

But the DNS resolution step is still unprotected. So, two broad cases:

1. Your adversary can subvert DNS. In this case IP certificates add no value, because they can just point you to 5.6.7.8, and you'll happily disclose "www.secret.com" to them. And you have no other path to communicate any information about what keys to trust.

2. Your adversary cannot subvert DNS. But if you can rely on DNS, then you can use it as a channel for key information; you include a key to encrypt the ESNI for "www.secret.com" in a DNS record. Even if the adversary can spoof the actual IP traffic to and from 1.2.3.4, it won't do any good because it won't have the private key corresponding to that ESNI key in the DNS. And those keys are already standardized.

So what adversary is stopped by IP certificates who isn't already stopped by the ESNI key records in the DNS?

tptacek•1h ago
Presumably you're encrypting DNS.
infogulch•1h ago
Sure, I agree, the next increment in privacy comes with using DoT/DoH (in fact some browsers require this to use ESNI at all). Probably throw in DNSSEC next. Having IP certs is just one more (small) step in that direction.

> you include a key to encrypt the ESNI for "www.secret.com" in a DNS record

I've never heard of this, is this a thing that exists today? (edited to remove unnecessary comment)

gruez•58m ago
>I've never heard of this, is this a thing that exists today? Are you arguing against one small step in a series of improvements by using a nonexistent hypothetical as evidence that the small step is unnecessary?

see: https://en.wikipedia.org/wiki/Server_Name_Indication#Encrypt...

infogulch•23m ago
Thanks.

> Another Internet Draft incorporates a parameter for transmitting the ECH public keys via HTTPS and SVCB DNS record types, shortening the handshake process.[24][25]

[25]: Bootstrapping TLS Encrypted ClientHello with DNS Service Bindings | https://datatracker.ietf.org/doc/draft-ietf-tls-svcb-ech/

tptacek•27m ago
DNSSEC is an integrity control, not a privacy control.
infogulch•20m ago
gp proposes a scenario where an integrity breach is lifted to a privacy breach, insisting on a strict distinction doesn't seem useful in this context.
spelunker•2h ago
Might be nice for local/development environment work. Test HTTPS without needing to set up `my-dev-env.staging.service.com` or whatever.
martinald•2h ago
Yes definitely.
cpach•2h ago
But these are public certificates. Most personal computers are behind NAT, i.e. they lack a public IP address.
hypeatei•2h ago
One use-case is connecting to a DoT (DNS-over-TLS) server directly rather than using a hostname. If you make a TLS connection to an IP address via OpenSSL, it will verify the IP SAN and fail if it's not there.
charcircuit•1h ago
It helps break free of ICANN's domain name system. This enables for competitors to support https without needing self signed certs.
Am4TIfIsER0ppos•58m ago
The intended use case is to forbid plain http so that you can't communicate with the computer in the next room without 3rd party permission.
richm44•3h ago
Time for me to dust off CVE-2010-3170 again? :-)
NicolaiS•31m ago
I guess a bunch of "roll your own X.509 validation"-logic will have that bug, but to exploit it you need a misbehaving CA to issue you such a cert (i.e. low likelihood)
OptionOfT•3h ago
Interesting, there is no subject in the example cert shown.

Is this because the certificate was requested for the IP, and other DNS entries were part of the SAN?

jaas•3h ago
We (Let's Encrypt) are getting rid of subject common names and moving to just using subject alternative names.

This change has been made in short-lived (6 day) certificate profiles. It has not been made for the "classic" profile (90 day).

zdw•3h ago
This seems to be for public IP addresses, not private RFC1918 ipv4 range addresses.

The only challenges possible are HTTP and TLS-ALPN, not DNS, so the "proof" that you own the IP is that LetsEncrypt can contact it?

ameliaquining•1h ago
Yes, which is the same way control of a domain name is typically checked; DNS is only used in a minority of cases as it can't be as turnkey.
Hizonner•1h ago
Having DNS available wouldn't be any more "proof". The person applying gets to choose which form of proof will be provided, so adding more options can only ever make it easier to "prove" things.
lq9AJ8yrfs•3h ago
So all the addressing bodies (e.g., ISPs and cloud providers) are on board then right? They sometimes cycle through IP's with great velocity. Faster than 6 days at least.

Lots of sport here, unless perhaps they cool off IPs before reallocating, or perhaps query and revoke any certs before reusing the IP?

If the addressing bodies are not on board then it's a user responsibility to validate the host header and reject unwanted IP address based connections until any legacy certs are gone / or revoke any legacy certs. Or just wait to use your shiny new IP?

I wonder how many IP certs you could get for how much money with the different cloud providers.

hk1337•2h ago
> I wonder how many IP certs you could get for how much money with the different cloud providers.

I wonder if they'll offer wildcard certs at some point.

Hizonner•2h ago
> So all the addressing bodies (e.g., ISPs and cloud providers) are on board then right? They sometimes cycle through IP's with great velocity. Faster than 6 days at least.

... or put multiple customers on the same IP address at the same time. But presumably they wouldn't be willing to complete the dance necessary to actually get certs for addresses they were using that way.

Just in case, though, it's probably a good idea to audit basically all software everywhere to make sure that it will not use IP-based SANs to validate connections, even if somebody does, say, embed a raw IP address in a URL.

This stuff is just insanity.

schoen•1h ago
There was a prior concern in the history of Let's Encrypt about hosting providers that have multiple customers on the same server. In fact, phenomena related to that led to the deprecation of one challenge method and the modification of another one, because it's important that one customer not be able to pass CA challenges on behalf of another customer just because the two are hosted on the same server.

But there was no conclusion that customers on the same server can't get certificates just because they're on the same server, or that whoever legitimately controls the default server for an IP address can't get them.

This would be a problem if clients would somehow treat https://example.com/ and https://96.7.128.175/ as the same identifier or security context just because example.com resolves to 96.7.128.175, but I'm not aware of clients that ever do so. Are you?

If clients don't confuse these things in some automated security sense, I don't see how IP address certs are worse than (or different from) certs for different customers who are hosted on the same IP address.

Hizonner•1h ago
Perhaps I didn't make myself clear. I don't think that IP certs will end up getting issued for shared servers, and definitely not in a way where tenants can impersonate one another. Not often enough to worry about, anyway.

The point was that it affects the utility of the idea.

... and don't get me started on those "challenge methods". Shudder. You'll have me ranting about how all of X.509 really just needs to be taken out and shot. See, I'm already doing it. Time for my medication...

xg15•1h ago
So in the case of multiple users behind a NAT, the cert for 96.7.128.175 would identify whichever party has control over the 443 port on that address?
afiori•1h ago
The way in which they are worse is that IP addresses are often unstable and shuffled around since generally the end user of the address is not its owner. It would be similar to getting a cert for myapp.github.io, technically perfectly valid but GitHub can add any moment steal the name from you since they are the owner, not you
AutistiCoder•56m ago
also, HTTPS certs are for in transit - so I see no reason why one certificate can't be used for all the Websites on the same server.
gruez•1h ago
>So all the addressing bodies (e.g., ISPs and cloud providers) are on board then right? They sometimes cycle through IP's with great velocity. Faster than 6 days at least.

>Lots of sport here, unless perhaps they cool off IPs before reallocating, or perhaps query and revoke any certs before reusing the IP?

I don't see how this is any different than custom/vanity domains you can get from cloud providers. For instance on azure you can assign a DNS name to your VMs in the form of myapp.westus.cloudapp.azure.com, and CAs will happily issue certificates for it[1]. There's no cooloff for those domains either, so theoretically someone else can snatch the domain from you if your VM gets decommissioned.

[1] https://crt.sh/?identity=westus.cloudapp.azure.com&exclude=e...

eddythompson80•30m ago
There is in fact weird cool off times for these cloud resources. I’m less familiar with AWS, but I know in azure once you delete/release one of these subdomains, it remains tied to your organization/tenant for 60 or 90 days.

You can reclaim it during that time, but any other tenant/organization will get an error that the name is in use. You can ping support to help you there if you show them you own both organizations. I was doing a migration of some resources across organizations and ran into that issue

timewizard•2h ago
I've personally never felt comfortable using regexes to solve production problems. The certificate code referenced here shows why:

https://github.com/mozilla-firefox/firefox/blob/d5979c2a5c2e...

Yikes.

ameliaquining•1h ago
I think that's not doing anything security-critical, it's just formatting an IPv6 address for display in the certificate-viewer UI.
cpburns2009•1h ago
All that regex does is split an IPv6 address into groups of 4 digits, joins them with ":", and collapses any sequence of ":0000:" to "::". I don't see anything problematic with it.
timewizard•56m ago
> and collapses any sequence of ":0000:" to "::"

Which is an error. Any ip like 2001:0000:0000::1 is going to be incorrect. It willingly produces errors. Whoever wrote this didn't even spend a few seconds thinking about the structure of IPv6 addresses.

> I don't see anything problematic with it.

Other than it being completely wrong and requiring a regex to be compiled for an amount of work that's certainly less than the compilation itself.

cpburns2009•9m ago
It only operates on a 32 digit IPv6 address so it won't already be abbreviated. My phrasing was inexact. It replaces only the first sequence of any number of ":0000:" to "::".
remram•5m ago
> Any ip like 2001:0000:0000::1 is going to be incorrect.

This is neither a possible input nor a possible output of that code.

baobun•1h ago
Unless you see a glaring issue I don't: I think you are getting the causality wrong there. You "Yikes" because of your discomfort and lack of practice with regexes.
timewizard•55m ago
> You "Yikes" because of your discomfort and lack of practice with regexes.

That's exceptionally presumptions to the point of being snotty.

> I think you are getting the causality wrong there.

Where did I imply causality? This was simply an occasion to look at the code. This is bad code. I would not pass this. What's your _justification_ for using a regex here?

0xbadcafebee•2h ago
Nice, another exploit for TLS. The previous ones were all about generating valid certs for a domain you don't own. This one will be for generating a cert for an IP you don't own. The blackhats will be hooting and hollering on telegram :)
Hizonner•2h ago
So does anybody have a pointer to the official justification for this insanity?
fredfish•2h ago
https://github.com/cabforum/servercert/pull/579/commits

</s?

Hizonner•2h ago
I'm sorry, but how is "Require validation of DNSSEC (when present) for CAA and DCV Lookups" related to issuing X.509 certs that include IP address SANs? I don't see any connection, and I didn't spot anything about it on a quick skim of the comments.
fredfish•1h ago
Anything from people who are afraid of increasingly onerous DNS requirements to breakage because they can't fix their parent domains DNSSEC misconfiguration. It seems like an interesting timing coincide to me so I wonder if there's some (ir)rational explanation. (Implementing a new SAN that must inherently have the gap you are finally addressing is not a bit funny to you?)
ameliaquining•1h ago
The announcement is https://letsencrypt.org/2025/01/16/6-day-and-ip-certs/. I don't think it's more complicated than: there exist services that for one reason or another don't have a domain name and are instead accessible by a public static IP address, and they need TLS certificates for security, and other CAs offer this, so Let's Encrypt should too. Is there any specific reason why they shouldn't?
Hizonner•1h ago
Hmm. Absolutely no explanation of why there's a need. Given only that announcement, I'd have to assume that the reason is "because we can".

So the first reason not to do it is that you never want to change software without a good reason. And none of the use cases anybody's named here so far hold water. They're all either skill issues already well addressed by existing systems, or fundamental misunderstandings that don't actually work.

Changing basic assumptions about naming is an extra bad idea with oak leaf clusters, because it pretty much always opens up security holes. I can't point to the specific software where somebody's made a load-bearing security assumption about IP address certificates not being available (more likely a pair of assumptions "Users will know about this" and "This can't happen/I forgot about this")... but I'll find out about it when it breaks.

Furthermore, if IP certificates get into wide use (and Let's Encrypt is definitely big enough to drive that), then basically every single validator has to have a code path for IP SANs. Saying "you don't have to use it" is just as much nonsense as saying "you don't have to use IP". Every X.509 library ends up with a code path for IP SANs, and it effectively can't even be profiled out. Every library is that much bigger and that much more complicated and needs that much more maintenance and testing. It's a big externalized cost. It would better to change the RFCs to deprecate IP SANs; they never should have been standardized to begin with.

It also encourages a whole bunch of bad practices that make networks brittle and unmaintainable. You should almost never see an IP address outside of a DNS zone file (or some other name resolution protocol). You can argue that people shouldn't do stupid things like hardwiring IP addresses even if they're given the tools... but that's no consolation to the third parties downstream of those stupid decisions.

... and it doesn't even work for all IP addresses, because IP addresses aren't global names. So don't forget to special-case the locally administered space in every single piece of code that touches an X.509 certificate.

ameliaquining•26m ago
TLS certificates for IP addresses are already a thing that exists. You can, for instance, go to https://1.1.1.1 in your browser right now (it used to actually serve the HTML from there but now it's a redirect). If that doesn't work in a given TLS client, this will be treated as a bug in that client, and rightly so. The genie is out of the bottle; nobody is going to remove support for things that work today just because it'd be slightly cleaner. So TLS clients are already paying the maintainability costs of supporting IP address certificates; this isn't a new change.

I'm not sure why private IP addresses would need to be treated differently other than by the software that issues certs for publicly trusted CAs (which is highly specialized and can handle the few extra lines of code, it's not a big cost for the whole ecosystem). Private CAs can and do issue certs for private IP addresses.

Also, how would DoH or DoT work without this?

leoh•1h ago
It seems to me they could just as easily issue subdomains and certs for said IPs and make the whole thing infinitely safer.
parliament32•45m ago
I could see the opposite argument: domain names who knows, someone could steal it or hack the registrar, registrar could be evil, DNS servers could be untrusted and/or evil or MITM'd... connecting to an IP you're engineering out entire classes of weaknesses in the scheme.
zipping1549•2h ago
Boy that doesn't sound good.
vkdelta•2h ago
Does it help getting encrypted https (without self signed cert error) on my local router ? 192.168.0.1 being an example login page.
ameliaquining•2h ago
No, they won't issue a certificate for a private IP address because you don't have exclusive control over it (i.e., the same IP address would point to a different machine on someone else's network).
qmarchi•1h ago
No but maybe yes: It would be impossible, and undesirable to issue certificates for local addresses. There's no way to verify local addresses because, inherently, they're local and not globally routable.

However, if a router manufacturer was so inclined, they _could_ have the device request a certificate for their public IPv4 address, given that it's not behind CG-NAT. v6 should be relatively easy since (unless you're at a cursed ISP) all v6 is generally globally routable.

johnklos•1h ago
You have to possess the IP.
jekwoooooe•1h ago
No and it shouldn’t. You can just run a proxy with a real domain and a real cert and then use dns rewrites to point that domain to a local host

For example you can use nginx manager if you want a ui and adguard for dns. Set your router to use adguard as the exclusive dns. Add a rewrite rule for your domain to point to the proxy. Register the domain and get a real cert. problem solved

All of my local services use https

remram•12m ago
No, on the contrary. You can't get a valid certificate for non-global IP, but you can already get a certificate for a domain name and point it to 192.168.0.1.
msgodel•1h ago
This is incredibly dumb. The three way handshake and initial key exchange is your certificate.
cpburns2009•6m ago
That would be fine if browsers didn't throw up giant warning signs when using self-signed certificates.
foresto•51m ago
I expect SAN in this case means Subject Alternative Name, not Storage Area Network.

Sigh... I wish people would use their words before trotting out possibly-ambiguous (or obscure) acronyms. It would help avoid confusion among readers who don't live and breathe the topic on the writer's mind.

parliament32•49m ago
If you don't know how to interpret "SAN" in a blog post from a TLS certificate issuer, I don't think you're the target audience for this post.
NewJazz•35m ago
OK, but how hard is a link to Wikipedia?
foresto•20m ago
Lots of people on HN are not the target audience for any given post, yet are still interested.

(And my point applies to all writing and speaking, not just this post.)

Operyl•45m ago
There’s only one, and not really obscure, interpretation of this acronym in a technical forum post announcement from a TLS certificate authority, the context was sufficient.