this post was submitted on 18 Mar 2026
647 points (99.1% liked)
Technology
82882 readers
2517 users here now
This is a most excellent place for technology news and articles.
Our Rules
- Follow the lemmy.world rules.
- Only tech related news or articles.
- Be excellent to each other!
- Mod approved content bots can post up to 10 articles per day.
- Threads asking for personal tech support may be deleted.
- Politics threads may be removed.
- No memes allowed as posts, OK to post as comments.
- Only approved bots from the list below, this includes using AI responses and summaries. To ask if your bot can be added please contact a mod.
- Check for duplicates before posting, duplicates may be removed
- Accounts 7 days and younger will have their posts automatically removed.
Approved Bots
founded 2 years ago
MODERATORS
you are viewing a single comment's thread
view the rest of the comments
view the rest of the comments
Could you please explain why not renewing their certs is such a serious betrayal? Like, if they fixed it, isn't that okay? And even if it happened again, and they fixed it again, isn't it human to err? Or why is it such a harsh offense?
Serious question, I don't know the consequences of not renewing these certs. ๐
It's the tls certificate that proves your website is legit. Without which, you can potentially be a malicious actor that can pose as the website, and when you download the iso, you could unknowingly download something malicious. It's pretty hard to forget certificate renewal (most of the time there are plenty of reminders sent and warnings given), so the fact that it happened twice was very impressively bad.
Oh boy. Seems to be the opposite in real life. Especially when it comes to managing stored cert of businesses partners. It has gotten somewhat better now of course, but three years ago most of my company's sev1 production issues were due to lapsing or unscheduled cert changes.
Can confirm it happens often here too indeed.
it's the main way for software to verify the identity of a source. without it you let nefarious actors do something like hijack a DNS server and impersonate your servers to your users, which is a pretty big problem if you're running a software distribution network! it is literally a breach of trust and massive security vulnerability. and it probably broke a ton of shit when software that uses the certificate found an expired one and suddenly (and correctly) refused to work.
People are very harsh with Manjaro. There's more than just a list of objective facts unfortunately. I suppose there were some bruised egos at some point.
The certs issue wasn't a big deal, it didn't change anything for me as a user. It just paints a bad image.
As a former Manjaro user, it has some issues. It has weird bugs that aren't present in any other Arch-based distro. Pamac ddosing the AUR is pretty bad as well. I'm thankful I used it as long as I did though. It got me hooked on Arch based distros. Everything else feels antiquated now. Actually, Void Linux is kinda cool
Its not just the fact that certs expired, it's them advising people to bypass warnings or change their system time and how many times they've had the issue.
I don't recall anything related to accepting warnings or changing system time but I may have missed it.
https://web.archive.org/web/20150409095421/https://manjaro.github.io/expired_SSL_certificate/