• Kazumara@discuss.tchncs.de
      link
      fedilink
      English
      arrow-up
      10
      ·
      4 days ago

      Sure, just convince the creators and maintainers of important software certificate stores to add your trust root. For example: Google, Mozilla, Microsoft, Apple, Linux, Cisco, Oracle, Java, Visa.

    • frezik@midwest.social
      link
      fedilink
      English
      arrow-up
      13
      ·
      4 days ago

      Your browser and/or OS has a list of trusted certs called “certificate authorities”. When it receives a cert from a web site, it checks that it was signed by a CA. So what you’re asking is to become your own CA.

      That basically means convincing Mozilla, Microsoft, Google, Apple, etc. that you know how to safely manage certs. It tends to be a pretty high bar. For example, many CAs have a root cert that they keep locked away in a safe that only a few people have access to behind several other layers of security. They have a secondary key that’s signed by the root, and the secondary key is used to sign actual customer certificates. That way, they can expire the secondary every year or so and only ever use the root when they need a new secondary. IIRC, Let’s Encrypt has two secondaries with overlapping expiration times.

      So to answer your question, no, not unless you’re willing to go to great lengths and have a great deal of knowledge about TLS.

    • AHemlocksLie@lemmy.zip
      link
      fedilink
      English
      arrow-up
      12
      ·
      4 days ago

      I don’t know what the process is like to become a certificate authority. I imagine the answer is technically yes but realistically no, at least not as an individual. You’d be providing a critical piece of internet infrastructure, so you’d need the world to consider you capable of providing the service reliably while also capable of securing the keys used to sign certificates so they can’t be forged. It’s a big responsibility that involves putting a LOT of trust in the authority, so I don’t think it’s taken very lightly.

      • eyeon@lemmy.world
        link
        fedilink
        English
        arrow-up
        2
        ·
        4 days ago

        Correct, though to be pedantic anyone can be a CA- you just generate a cert with the right bits to say it’s a ca certificate and then use it to sign any other certificate you want.

        But the only devices that will consider your signature worth anything are ones you also install your ca certificate on. So it’s useful and common in internal networks but isn’t really what is being asked here.

        The hard part is getting in the root CA store of operating systems and browsers. As far as I know they are all maintained independently with their own requirements.