The PKI Trust Paradox

By Pepijn van der Stap 6 min read
PKI cryptography certificate transparency

We've built the internet's security on a foundation of trust we can't truly verify. The Certificate Authority system—defined in RFC 5280 and extended by RFC 6962—is arguably flawed by design.

A single compromised CA, anywhere in the world, can issue a "valid" certificate for any entity. This isn't theoretical, we've seen it happen. DigiNotar, Comodo, Symantec. Each incident exposed the fundamental weakness: our entire PKI model assumes perfect security and perfect integrity from hundreds of organizations across dozens of jurisdictions.

The structural problem

RFC 5280 established a hierarchical trust model where any root CA can vouch for any domain. This seemed reasonable in 1999, when the internet was smaller and Certificate Authorities were few. But scale broke the model.

Today, your browser trusts over 100 root certificates by default. Each represents not just a single organization, but an entire tree of subordinate CAs, resellers, and intermediate certificates. The attack surface isn't just massive, it's growing..

Certificate Transparency: A band-aid on a broken model..

Certificate Transparency (RFC 6962) was Google's response to the CA crisis. The idea is elegant: make all certificates public, so domain owners can detect unauthorized certificates issued for their domains.

But CT is fundamentally reactive. It helps you discover that someone has compromised a CA and issued a certificate for your domain—after the fact. By then, the attacker may have already captured sensitive data or established persistence.

More concerning: CT assumes domain owners are actively monitoring logs for their domains. This works for Google and Facebook. It doesn't work for the millions of small businesses and individuals who don't even know CT exists.

The Economics of Trust

The CA business model incentivizes volume over security. CAs make money by issuing certificates, not by refusing them. Domain validation often consists of sending an email to admin@domain.com or serving a file over HTTP—both trivially bypassed by attackers who have already compromised the domain.

Extended Validation (EV) certificates promised higher security through rigorous identity verification. But browser vendors have largely abandoned EV indicators, recognizing that the green bar created a false sense of security while doing little to prevent actual attacks.

Beyond PKI: What real solutions look like

The future isn't more CAs; it's systems that assume compromise, verify relentlessly, and trust nothing by default.

DNS-Based Authentication of Named Entities (DANE)

DANE allows domain owners to specify which certificates are valid for their domains directly in DNS records. It eliminates the need to trust CAs entirely: if you control the DNS, you control certificate validation.

The challenge is DNSSEC adoption. Without cryptographic signatures on DNS records, DANE is vulnerable to DNS spoofing attacks.

HTTP Public Key Pinning (HPKP) and Expect-CT

Key pinning allows websites to declare which certificates or CAs are authorized to serve their content. Browsers remember these declarations and reject connections that violate them.

Both mechanisms failed to gain widespread adoption due to operational complexity and the risk of accidentally locking legitimate users out of websites. But the underlying principle—explicit trust declarations—remains sound.

Certificate Authority Authorization (CAA)

CAA records let domain owners specify which CAs are authorized to issue certificates for their domains. It's simpler than DANE and doesn't require DNSSEC, making adoption more realistic.

The limitation: CAA only works if CAs actually check it. Compliance is mandated by the CA/Browser Forum, but enforcement is inconsistent.

The path forward? Uncomfortable

Real PKI reform requires acknowledging uncomfortable truths:

  • Trust doesn't scale. The more entities you trust, the weaker your security model becomes.
  • Economic incentives matter. As long as CAs profit from issuing certificates, they'll err toward issuance.
  • Reactive security is insufficient. By the time you detect a rogue certificate, the damage is often done.
  • Complexity is the enemy. Security mechanisms that are too complex for operators to implement correctly will fail.

We need systems that combine the operational simplicity of current PKI with the security properties of mutual authentication. That might mean moving beyond X.509 certificates entirely, toward models like Web of Trust or blockchain-based identity systems.

Or it might mean accepting that perfect security is impossible and focusing on rapid detection and response instead. Certificate Transparency was a step in that direction, but we need to go further.

So..

The PKI trust paradox isn't just a technical problem, it's a fundamental mismatch between the security guarantees we need and the trust model we've inherited.

RFC 5280 served us well for two decades, but the internet it was designed for no longer exists. It's time to stop patching a broken foundation and start building its replacement.

Post scriptum

Trust is not a technical problem that can be solved with more technology. It's a human problem that requires aligning incentives, reducing complexity, and accepting that perfect security is an illusion.