Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

They do if your entire PKI infra is down too


A company's internal PKI infrastructure wouldn't be responsible for issuing a public-facing certificate. They literally can't sign those -- a real CA has to do it.


You are of course correct but usually public and private would reuse some core components of the infra (eg still need to store signed key pair somewhere safe). I’m speculating here but given how long it’s been down some very core and very difficult to recover service must have failed. Security infra tends to have those properties


Downtime is expensive. You could just bypass your infra and manually get it working so that you can fix your infra while production is up instead of when it's down.


That's in fact how most high-impact events should be handled: mitigate the issue with a potentially short-term solution, once things are back up find the root cause, fix the root cause, and perform a thorough analysis of events to ensure it won't happen again.


Depending on the level of automation that may not be possible. That’s like saying if factory line robot fails “you just bypass the line and manually weld those car bodies”


Wait. You can sign your own. They are just not trusted by the wider world. Your devices have an OS provided set of trusted root-CA.




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: