frontpage.
newsnewestaskshowjobs

Made with ♥ by @iamnishanth

Open Source @Github

fp.

Vaccinated dog tests positive for rabies, at least 13 people PEP so far

https://www.cookcountyil.gov/news/cook-county-department-animal-and-rabies-control-confirms-rabie...
1•stockresearcher•1m ago•0 comments

Realtime Raytracing in Bevy 0.18 (Solari)

https://jms55.github.io/posts/2025-12-27-solari-bevy-0-18/
1•ibobev•1m ago•0 comments

It's an Active Choice to Lie This Much – Micron's "Commitment" to Gamers [video]

https://www.youtube.com/watch?v=uvahiVBvn9A
1•pabs3•2m ago•0 comments

Show HN: What 4M posts reveal about going viral on Hacker News

https://hn-ph.vercel.app
2•salebanolow•9m ago•0 comments

AI data centers may soon be powered by retired Navy nuclear reactors

https://www.tomshardware.com/tech-industry/startup-proposes-using-retired-navy-nuclear-reactors-f...
1•pabs3•9m ago•0 comments

Who Cares about the Baltic Jammer? Terrestrial Navigation in Baltic Sea Region [video]

https://media.ccc.de/v/39c3-who-cares-about-the-baltic-jammer-terrestrial-navigation-in-the-balti...
1•Fnoord•12m ago•0 comments

Ask HN: Why I can't enable Chrome Gemini Nano on my MacBook with M1?

1•denis4inet•14m ago•0 comments

Marissa Mayer's new startup Dazzle raises $8M

https://techcrunch.com/2025/12/23/marissa-mayers-new-startup-dazzle-raises-8m-led-by-forerunners-...
1•holografix•25m ago•0 comments

Eye blink monitoring to prevent dry eyes

https://www.blinkingmatters.com/download
2•predkambrij•39m ago•0 comments

A Guide to Claude Code 2.0 and getting better at using coding agents

https://sankalp.bearblog.dev/my-experience-with-claude-code-20-and-how-to-get-better-at-using-cod...
1•dejavucoder•39m ago•0 comments

'The Tree of Life' review: The ancestor at the root of it all

https://www.wsj.com/arts-culture/books/the-tree-of-life-review-the-ancestor-at-the-root-of-it-all...
1•hhs•43m ago•0 comments

Show HN: attainable – The fastest and easiest way to design and deploy APIs

https://attainable.dev
1•clintjhill•43m ago•0 comments

Toward Training Superintelligent Software Agents Through Self-Play SWE-RL

https://arxiv.org/abs/2512.18552
1•klipt•47m ago•0 comments

Direct Memory Access Cheat-Anticheat Evolution Timeline

https://isdmadead.com/
2•areoform•51m ago•0 comments

Why Reliability Demands Functional Programming

https://blog.rastrian.dev/post/why-reliability-demands-functional-programming-adts-safety-and-cri...
4•rastrian•51m ago•0 comments

Construction of ubiquitous surveillance has proceeded unhindered for many years

https://computer.rip/2025-12-26-Flock-and-Urban-Surveillance.html
2•macleginn•55m ago•0 comments

Claude on Rails

https://claudeonrails.dev/
2•handfuloflight•55m ago•0 comments

DHH is immortal, and costs $200M

https://danieltenner.com/dhh-is-immortal-and-costs-200-m/
5•avyfain•57m ago•2 comments

Insights from Paper: FoundationDB:A Distributed Unbundled Transactional KV Store

https://hemantkgupta.medium.com/insights-from-paper-foundationdb-a-distributed-unbundled-transact...
1•teleforce•1h ago•0 comments

Rediscovering an American court portraitist

https://www.nationalreview.com/magazine/2026/02/rediscovering-an-american-court-portraitist/
1•hhs•1h ago•0 comments

Shutting Down the Hoover Building

https://twitter.com/FBIDirectorKash/status/2004650061242789976
1•hbcondo714•1h ago•0 comments

US judge blocks detention of British social media campaigner

https://www.bbc.com/news/articles/c33mx6j5jrvo
4•rbanffy•1h ago•1 comments

Ukraine Is Winning the War at Sea

https://phillipspobrien.substack.com/p/weekend-update-164-ukraine-is-winning
4•JumpCrisscross•1h ago•1 comments

Does tax avoidance trickle down?

https://www.nber.org/papers/w34209
2•hhs•1h ago•1 comments

Show HN: I built opencode –> telegram notification plugin

https://github.com/Davasny/opencode-telegram-notification-plugin
3•davasny•1h ago•0 comments

Stress-induced sympathetic hyperactivation drives hair follicle necrosis

https://www.cell.com/cell/fulltext/S0092-8674(25)01247-4?_returnURL=https%3A%2F%2Flinkinghub.else...
2•PaulHoule•1h ago•0 comments

Notes about FoundationDB (2020)

https://pierrezemb.fr/posts/notes-about-foundationdb/
3•teleforce•1h ago•0 comments

Reminiscences of a Stock Operator (1923)

https://gutenberg.org/cache/epub/60979/pg60979-images.html
1•thomassmith65•1h ago•0 comments

Julia vs. NumPy performance: Strategy for For-loop?

1•northlondoner•1h ago•1 comments

With memory prices to rise another 45% in 2026, Lenovo may delay laptop launches

https://www.notebookcheck.net/With-memory-prices-expected-to-rise-another-45-in-2026-Lenovo-may-d...
5•akyuu•1h ago•0 comments
Open in hackernews

The Dangers of SSL Certificates

https://surfingcomplexity.blog/2025/12/27/the-dangers-of-ssl-certificates/
15•azhenley•2h ago

Comments

loloquwowndueo•1h ago
There are plenty of other technologies whose failure mode is a total outage, it’s not exclusive to a failed certificate renewal.

A certificate renewal process has several points at which failure can be detected and action taken, and it sounds like this team was relying only on a “failed to renew” alert/monitor.

A broken alerting system is mentioned “didn’t alert for whatever reason”.

If this certificate is so critical, they should also have something that alerts if you’re still serving a certificate with less than 2 weeks validity - by that time you should have already obtained and rotated in a new certificate. This gives plenty of time for someone to manually inspect and fix.

Sounds like a case of “nothing in this automated process can fail, so we only need this one trivial monitor which also can’t fail so meh” attitude.

yearolinuxdsktp•1h ago
Additionally, warnings can be built into the clients themselves. If you connect to a host with less than 2 weeks cert expiry time, print a warning in your client. That will be further incentive to not let certs be not renewed in time.
flowerlad•1h ago
We need a way to set multiple SSL certificates with overlapping duration. So if one certificate expires the backup certificate will become active. If the overlap is a couple of months then you have plenty of time to detect and fix the issue.

Having only one SSL certificate is a single point of failure, we have eliminated single points of failure almost everywhere else.

woodruffw•1h ago
You can do this pretty easily with Let’s Encrypt, to my knowledge. You can request resistance every 30 days, for example, which would give you a ladder of three 90 day certificates.

Edit: but to be clear, I don’t understand why you’d want this. If you’re worried about your CA going offline, you should shorten your renewal period instead.

flowerlad•1h ago
Do services such as K8S ingress and Azure web apps allow you to specify multiple certificates?

Update: looks like the answer is yes. So then the issue is people not taking advantage of this technique.

woodruffw•58m ago
I don’t think there’s a ton of benefit to the technique. If you’re worried about getting too close to your certificate expiry via automation, the solution is to renew earlier rather than complicate things with a ladder of valid certs.
kees99•49m ago
Exactly. It's not like backup certificate have validity starting at a future date.
flowerlad•38m ago
Yes the backup certificate can have validity starting at a future date. You just need to wait till that future date to create it.
throw0101c•9m ago
> We need a way to set multiple SSL certificates with overlapping duration.

Both Apache (SSLCertificateFile) and nginx (ssl_certificate) allow for multiple files, though they cannot be of the same algorithm: you can have one RSA, one ECC, etc, but not (say) an ECC and another ECC. (This may be a limitation of OpenSSL.)

So if the RSA expires on Feb 1, you can have the ECC expire on Feb 14 or Mar 1.

superkuh•1h ago
For corporations, institutions, and for-profits this matters and there's no real good solution.

But for human persons and personal websites HTTP+HTTPS fixes this easily and completely. You get the best of both worlds. Fragile short lifetime pseudo-privacy if you want it (HTTPS) and long term stable access no matter what via HTTP. HTTPS-only does more harm than good. HTTP+HTTPS is far better than either alone.

dvratil•57m ago
Happened on the first day of my first on-call rotation - a cert for one of the key services expired. Autorenew failed, because one of the subdomains on the cert no longer resolved.

The main lesson we took from this was: you absolutely need monitoring for cert expiration, with alert when (valid_to - now) becomes less than typical refresh window.

It's easy to forget this, especially when it's not strictly part of your app, but essential nonetheless.

0x073•57m ago
And it get worse, as they are changing the max days to until 47 in 2029.
JoshTriplett•37m ago
On the other hand, as the time gets shorter, it'll become less likely that something will go undetected for a long time.
dextercd•54m ago
You need external monitoring of certificate validity. Your ACME client might not be sending failure notifications properly (like happened to Bazel here). The client could also think everything is OK because it acquired a new cert, meanwhile the certificate isn't installed properly (e.g., not reloading a service so it keeps using the old cert).

I have a simple Python script that runs every day and checks the certificates of multiple sites.

One time this script signaled that a cert was close to expiring even though I saw a newer cert in my browser. It turned out that I had accidentally launched another reverse proxy instance which was stuck on the old cert. Requests were randomly passed to either instance. The script helped me correct this mistake before it caused issues.

firesteelrain•21m ago
There is a Prometheus plugin called ssl_exporter that will provide the ability for Grafana to display a dashboard of all of your certs and their expirations. But, the trick is that you need to know where all your certs are located. We were using Venafi to do auto discovery but a simple script to basically nmap your network provides the same functionality.
throw20251220•53m ago
TLS certificates… SSL is some old Java anachronism.

> There’s no natural signal back to the operators that the SSL certificate is getting close to expiry.

There is. The not after is right there in the certificate itself. Just look at it with openssl x509 -text and set yourself up some alerts… it’s so frustrating having to refute such random bs every time when talking to clients because some guy on the internet has no idea but blogs about their own inefficiencies.

Furthermore, their autorenew should have been failing loud and clear, everyone should know from metrics or logs… but nobody noticed anything.

tomas789•26m ago
I don’t think this is as simple as it seems. For example, we have our own CA and issue several mTLS certificates, with hundreds of them currently in use across our machines. We need to check every single one (which we don’t do yet) because there is an additional distribution step that might fail selectively. And that’s not even touching on expiring CAs, which is a total nightmare.
gmuslera•30m ago
If you think SSL certificates are dangerous, try seeing the dangers of NOT using them, specially for a service that is a central repository of artifacts meant to be automatically deployed.

It is not about encryption (that a self-signed certificate lasting till 2035 will suffice), but verification, who am I talking with, because reaching the right server can be messed up with DNS or routing, among other things. Yes, that adds complexity, but we are talking more about trust than technology.

And once you recognize that it is essential to have a trusted service, then give it the proper instrumentation to ensure that it work properly, including monitoring and expiration alerts, and documentation about it, not just "it works" and dismiss it.

May we retitle the post as "The dangers of not understanding SSL Certificates"?

duufuvkfmc•14m ago
Debian’s apt do not use SSL as far as I know and I am not aware of any serious security disaster. Their packages are signed and content is not considered confidental.
direwolf20•13m ago
The selection of packages installed on a server should be treated as confidential, but you could probably infer it from file sizes.
firesteelrain•13m ago
Operationally, the issue is rooted in simple monitoring and accurate inventory. The article is apt: “ With SSL certificates, you usually don’t have the opportunity to build up operational experience working with them, unless something goes wrong”

You can update your cert to prepare for it by appending—-NEW CERT—-

To the same file as ——-OLD CERT—-

But you also need to know where all your certificates are located. We were using Venafi for the auto discovery and email notifications. Prometheus ssl_exporter with Grafana integration and email alerts works the same. The problem is knowing where all hosts, containers and systems that have certs are located. Simple nmap style scan of all endpoints can help. But, you might also have containers with certs or you might have certs baked into VM images. Sure, there all sorts of things like storing the cert in a CICD global variable, bind mounting secrets, Vault Secret Injector, etc

But it’s all rooted in maintaining a valid, up to date TLS inventory. And that’s hard. As the article states: “ There’s no natural signal back to the operators that the SSL certificate is getting close to expiry. To make things worse, there’s no staging of the change that triggers the expiration, because the change is time, and time marches on for everyone. You can’t set the SSL certificate expiration so it kicks in at different times for different cohorts of users.”

Every time this happens you whack a mole a change. You get better at it but not before you lose some credibility