frontpage.
newsnewestaskshowjobs

Made with ♥ by @iamnishanth

Open Source @Github

fp.

Open in hackernews

DNS-Persist-01: A New Model for DNS-Based Challenge Validation

https://letsencrypt.org/2026/02/18/dns-persist-01.html
64•todsacerdoti•2h ago

Comments

TrueDuality•1h ago
I think this is solving a real operational pain point, definitely one that I've experienced. My biggest hesitation here is the direct exposure of the managing account identity not that I need to protect the accounts key material, I already need to do that.

While "usernames" are not generally protected to the same degree as credentials, they do matter and act as an important gate to even know about before a real attack can commence. This also provides the ability to associate random found credentials back to the sites you can now issue certificates for if they're using the same account. This is free scope expansion for any breach that occurs.

I guarantee sites like Shodan will start indexing these IDs on all domains they look at to provide those reverse lookup services.

krunck•1h ago
Exactly. They should provide the user with a list of UUIDs(or any other randomish ID tied to the actual account) that can be used in the accounturi URL for these operations.
gsich•30m ago
The account is the same as you create in any acme client. I don't see potential for a reverse lookup.
mmh0000•49m ago
I really like and hate this at the same time.

Years ago, I had a really fubar shell script for generating the DNS-01 records on my own (non-cloud) run authoritative nameserver. It "worked," but its reliability was highly questionable.

I like this DNS-PERSIST fixes that.

But I don't understand why they chose to include the account as a plain-text string in the DNS record. Seems they could have just as easily used a randomly generated key that wouldn't mean anything to anyone outside Let's Encrypt, and without exposing my account to every privacy-invasive bot and hacker.

ragall•35m ago
Those who choose to use DNS-PERSIST-01 should fully commit to automation and create one LetsEncrypt account per FQDN (or at least per loadbalancer), using a UUID as username.
mcpherrinm•7m ago
There is no username in ACME, so the UUID you’re suggesting isn’t needed. The account uri themselves just have a number (db primary key).

If you’re worried about correlating between domains, then yes just make multiple accounts.

There is an email field in ACME account registration but we don’t persist that since we dropped sending expiry emails.

cyberax•31m ago
Ah, the next step towards True DANE!

We then can just staple the Persist DNS key to the certificate itself.

And then we just need to cut out the middleman and add a new IETF standard for browsers to directly validate the certificates, as long as they confirm the DNS response using DNSSEC.

tptacek•27m ago
This decreases the salience of DANE/DNSSEC by taking DNS queries off the per-issuance critical path. Attackers targeting multitenant platforms get only a small number of bites at the apple in this model.
cyberax•18m ago
Sure. It's yet another advantage of doing True DANE. But it still requires DNS to be reliable for the certificate issuance to work, there's no way around it.

So why not cut out the middleman?

(And the answer right now is "legacy compatibility")

tptacek•16m ago
I mean, the reason not to do DANE is that nobody will DNSSEC-sign, because DNSSEC signing is dangerous.
NoahZuniga•6m ago
DNS queries are still part of the critical path, as let's encrypt needs to check that the username is still allowed to receive a cert before each issuance.
micw•28m ago
I wonder why they switched from a super-secure-super-complex (in terms of operations) way of doing DNS auth to a super-simple-no-cryptography-involved method that just relies on the account id.

Why not using some public/private key auth where the dns contains a public key and the requesting server uses the private key to sign the cert request? This would decouple the authorization from the actual account. It would not reveal the account's identity. It could be used with multiple account (useful for a wildcard on the DNS plus several independent systems requesting certs for subdomains).

tptacek•25m ago
The most common vector for DNS-based attacks on issuance is compromised registrar accounts, and no matter how complicated you make the cryptography, if you're layering it onto the DNS, those attacks will preempt the cryptography.

Cosmologically Unique IDs

https://jasonfantl.com/posts/Universal-Unique-IDs/
106•jfantl•1h ago•13 comments

Tailscale Peer Relays is now generally available

https://tailscale.com/blog/peer-relays-ga
204•sz4kerto•3h ago•85 comments

DNS-Persist-01: A New Model for DNS-Based Challenge Validation

https://letsencrypt.org/2026/02/18/dns-persist-01.html
68•todsacerdoti•2h ago•13 comments

Show HN: Echo, an iOS SSH+mosh client built on Ghostty

https://replay.software/updates/introducing-echo
54•sgottit•1h ago•22 comments

R3forth: A Concatenative Language Derived from ColorForth

https://github.com/phreda4/r3/blob/main/doc/r3forth_tutorial.md
10•tosh•42m ago•1 comments

Pocketbase lost its funding from FLOSS fund

https://github.com/pocketbase/pocketbase/discussions/7287
69•Onavo•4h ago•41 comments

Learning Lean: Part 1

https://rkirov.github.io/posts/lean1/
34•vinhnx•3d ago•2 comments

OpenClaw Is Dangerous

https://12gramsofcarbon.com/p/tech-things-openclaw-is-dangerous
23•theahura•1h ago•12 comments

If you’re an LLM, please read this

https://annas-archive.li/blog/llms-txt.html
626•soheilpro•12h ago•301 comments

Activeloop (YC S18) Is Hiring Back End Engineer (Go)

https://app.dover.com/apply/Activeloop/72d0b3a7-7e86-46a8-9aff-b430ffe0b97f
1•davidbuniat•2h ago

Complexity Science and Emergent Order: How Simple Rules Create Complex Systems

https://mysticryst.com/blogs/the-mystic-journal/complexity-science-emergent-order-simple-rules-co...
6•rolph•46m ago•1 comments

Garment Notation Language: Formal descriptive language for clothing construction

https://github.com/khalildh/garment-notation
102•prathyvsh•4h ago•27 comments

What Every Experimenter Must Know About Randomization

https://spawn-queue.acm.org/doi/pdf/10.1145/3778029
10•underscoreF•1h ago•1 comments

Terminals should generate the 256-color palette

https://gist.github.com/jake-stewart/0a8ea46159a7da2c808e5be2177e1783
411•tosh•13h ago•163 comments

Zero-day CSS: CVE-2026-2441 exists in the wild

https://chromereleases.googleblog.com/2026/02/stable-channel-update-for-desktop_13.html
159•idoxer•3h ago•83 comments

Discrete Structures [pdf]

https://kyleormsby.github.io/files/113spring26/113full_text.pdf
9•mathgenius•48m ago•1 comments

Show HN: VectorNest responsive web-based SVG editor

https://ekrsulov.github.io/vectornest/
50•ekrsulov•4h ago•17 comments

99% of adults over 40 have shoulder "abnormalities" on an MRI, study finds

https://arstechnica.com/health/2026/02/99-of-adults-over-40-have-shoulder-abnormalities-on-an-mri...
25•rbanffy•1h ago•29 comments

The true history of the Minotaur: what archaeology reveals

https://www.nationalgeographic.fr/histoire/la-veritable-histoire-du-minotaure-ce-que-revele-arche...
21•joebig•3d ago•6 comments

Cistercian Numbers

https://www.omniglot.com/language/numbers/cistercian-numbers.htm
34•debo_•3h ago•7 comments

Arizona Bill Requires Age Verification for All Apps

https://reclaimthenet.org/arizona-bill-would-require-id-checks-to-use-a-weather-app
100•bilsbie•2h ago•79 comments

Show HN: Formally verified FPGA watchdog for AM broadcast in unmanned tunnels

https://github.com/Park07/amradio
40•anonymoosestdnt•5h ago•12 comments

SkyRL brings Tinker to your GPUs (2025)

https://novasky-ai.notion.site/skyrl-tinker
13•robertnishihara•5d ago•0 comments

Show HN: CEL by Example

https://celbyexample.com/
51•bufbuild•6h ago•21 comments

Fastest Front End Tooling for Humans and AI

https://cpojer.net/posts/fastest-frontend-tooling
79•cpojer•8h ago•34 comments

Show HN: Trust Protocols for Anthropic/OpenAI/Gemini

https://www.mnemom.ai
23•alexgarden•3h ago•11 comments

The only moat left is money?

https://elliotbonneville.com/the-only-moat-left-is-money/
167•elliotbnvl•4h ago•236 comments

Native FreeBSD Kerberos/LDAP with FreeIPA/IDM

https://vermaden.wordpress.com/2026/02/18/native-freebsd-kerberos-ldap-with-freeipa-idm/
91•vermaden•9h ago•44 comments

AVX2 is slower than SSE2-4.x under Windows ARM emulation

https://blogs.remobjects.com/2026/02/17/nerdsniped-windows-arm-emulation-performance/
92•vintagedave•6h ago•78 comments

Fei-Fei Li's World Labs raised $1B from A16Z, Nvidia to advance its world models

https://www.bloomberg.com/news/articles/2026-02-18/ai-pioneer-fei-fei-li-s-startup-world-labs-rai...
43•aanet•2h ago•13 comments