continually scan the entire IPv4 space.
That takes a LONG time, considering it's at least 4 billion packets per scan, routed all around the world. Anyway that's an argument for IPv6, not for "Certificate Transparency Logs".
It's also an argument for erasing the funds of rich fucks so they can't afford to continually barrage the Internet with their scans.
yourownsite.com could be spoofed
Not if nobody has heard about it! And what if it is spoofed? Do I call up the "Certificate Transparency Logs Police" and tell them that the record published to that log isn't legit? How do I prove that?
Don't screw up the HSTS or no visitors can come to your site for the next 13 years!
HTTP Strict Transport Security
https://en.wikipedia.org/wiki/HTTP_Strict_Transport_SecurityThat just uh... tells browsers to change http to https. The only way no one could visit is if you removed SSL and only served stuff over HTTP. The article says "If the security of the connection cannot be ensured (e.g. the server's TLS certificate is not trusted), the user agent must terminate the connection[2]: §8.4 and should not allow the user to access the web application" but that's just true for SSL in general, and it's stupid because your browser shouldn't decide what you are or are not allowed to do. It's not your mom!
So, if you mess up the HSTS, it... still connects via SSL and everything's fine. And if your certificate's expired, everyone's browser throws a hissy fit, regardless of that HSTS thing. Am I reading that right?
CC:
@[email protected]