this post was submitted on 18 Nov 2024
743 points (99.5% liked)

Technology

59446 readers
3638 users here now

This is a most excellent place for technology news and articles.


Our Rules


  1. Follow the lemmy.world rules.
  2. Only tech related content.
  3. Be excellent to each another!
  4. Mod approved content bots can post up to 10 articles per day.
  5. Threads asking for personal tech support may be deleted.
  6. Politics threads may be removed.
  7. No memes allowed as posts, OK to post as comments.
  8. Only approved bots from the list below, to ask if your bot can be added please contact us.
  9. Check for duplicates before posting, duplicates may be removed

Approved Bots


founded 1 year ago
MODERATORS
 

Happy birthday to Let's Encrypt !

Huge thanks to everyone involved in making HTTPS available to everyone for free !

top 48 comments
sorted by: hot top controversial new old
[–] jagged_circle@feddit.nl 2 points 1 hour ago* (last edited 1 hour ago)

Lots of people shitting on stories of people who buy certs.

You do still have to buy a cert if you want one for a .onion. Let's encrypt still doesn't support it :(

[–] jagged_circle@feddit.nl 1 points 1 hour ago (1 children)

I'm sad to say that all my sites where http only until 10 years ago

[–] JackbyDev@programming.dev 1 points 1 hour ago

Well, you usually had to pay extra back then!

[–] kaotic@lemmy.world 16 points 7 hours ago (1 children)

A client of mine pays for an SSL cert he doesn’t even use. I’ve told him before I moved him to Let’s Encrypt because I was able to automate the renew process. He decided he needed to continue paying for the SSL cert. I told him we are not using it, but he doesn’t believe me. So he continues to pay for it.

[–] pagenotfound@lemmy.world 1 points 2 hours ago

I love it when companies are too stubborn to update their costs despite the necessity changing over the years.

My previous employment kept buying microsoft office license keys despite us already moving to 365. They probably did it out of habit when buying new computers. Needless to say I have a cardstack of license keys at home lol. Granted it’s for Office 2013 but I don’t really need the latest version for basic document processing.

[–] JohnyRocket@discuss.tchncs.de 13 points 7 hours ago* (last edited 7 hours ago) (1 children)

It doesn't say on the website but on their anniversary day they are giving away unlimited ssl certs!

[–] jagged_circle@feddit.nl 1 points 1 hour ago

Well, they do rate limit

[–] nek0d3r@lemmy.world 16 points 10 hours ago (1 children)

And my parents still buy SSL certs because that's just what they know 🤢

[–] FMEEE@lemmy.dbzer0.com 3 points 9 hours ago (2 children)

Today it's just more or less stupid to buy SSL you can get one extremely easy for free from Let's Encrypt or Google Trust..

[–] NikkiDimes@lemmy.world 11 points 8 hours ago

Yeah, I uh...I think that's kinda what this whole conversation here is about

[–] nek0d3r@lemmy.world 2 points 7 hours ago

I've tried explaining to them before, but they think that it's a scam because it's free lol

[–] specialseaweed@sh.itjust.works 32 points 12 hours ago (1 children)

SSL Certs were so god awful before certbot that it’s hard to explain now that it’s so easy and free.

[–] whome@discuss.tchncs.de 4 points 8 hours ago

Also fucking expensive

[–] zerozaku@lemmy.world 7 points 9 hours ago (2 children)

Can anyone fill me on this? Why is it so significant?

[–] NikkiDimes@lemmy.world 30 points 8 hours ago* (last edited 8 hours ago)

HTTPS certs used to be very expensive and technically complicated, making it out of reach for most smaller orgs. Let's Encrypt brought easy mass adoption and changed encryption availability on the web for everyone.

[–] EngineerGaming@feddit.nl 15 points 8 hours ago (1 children)

It is the free, easy way to get an SSL cert (plus automated renewals). Without it, maybe HTTPS wouldn't have been so omnipresent.

[–] rottingleaf@lemmy.world 0 points 3 hours ago

And it shouldn't have been, SSL PKI is an intentionally rigged architecture. It's intended for nation-states to be able to abuse it.

I'd like much more some kind of overlay encryption over HTTP based on web of trust and what not. Like those distributed imageboards people were trying to make with steganography in emotion.

It's a trap. Everybody is already in it and it has already been activated, so - the discussion would be of historical interest only.

[–] __matthew__@lemmy.world 24 points 13 hours ago

Lol I instinctively freaked out when I saw the post preview assuming it was going to be a post about a major data breach or exploit of some sort relating to Let's Encrypt.

I probably need more positivity in my life 😂

[–] pressanykeynow@lemmy.world 40 points 16 hours ago

And it changed the Internet, for good and a lot.

[–] 0x01@lemmy.ml 127 points 19 hours ago (6 children)

Man I love let's encrypt, remember how terrible ssl was before the project landed?

[–] rottingleaf@lemmy.world 1 points 3 hours ago

When you have to use it, then yes. But in general standard technologies of today are mostly rigged.

[–] rikudou@lemmings.world 54 points 19 hours ago (1 children)

Crazy times. Nowadays it's weird when a website doesn't have https. Back then it was pretty much big companies only. And the price of a wildcard certificate...

[–] brbposting@sh.itjust.works 7 points 16 hours ago (1 children)

Except for neverssl.com

Triggering the launch of captive portals for public Wi-Fi users everywhere yayy

[–] Ghoelian@lemmy.dbzer0.com 1 points 2 hours ago (1 children)

That website says it will never use SSL, but it definitely just connected over https with a valid certificate when I went there.

[–] foggenbooty@lemmy.world 1 points 1 hour ago (1 children)

That's odd. Try httpforever.com instead.

[–] Ghoelian@lemmy.dbzer0.com 1 points 1 hour ago

Nice yeah that site actively rejects https connections.

[–] missphant@lemmy.blahaj.zone 12 points 15 hours ago (1 children)

I always had to fill out multiple pages of forms to get those free 1 year "trial" certs from startssl.

[–] xthexder@l.sw0.com 4 points 13 hours ago (1 children)

Oh man, I forgot about startssl until just now. I definitely had a few of those certs. If you wanted something fancy like a wildcard cert back then, you were paying $$$

[–] lud@lemm.ee 0 points 7 hours ago

Luckily, wildcard certs are insecure and should be avoided.

[–] treadful@lemmy.zip 9 points 15 hours ago

Remember they wanted like $75 for certs? The gall.

[–] leisesprecher@feddit.org 22 points 19 hours ago (1 children)

And if you remember, that this whole shebang was only started, because Snowden revealed that the NSA spied on all of us, it's getting much much darker.

[–] rottingleaf@lemmy.world 3 points 3 hours ago

People behave as if having a green lock icon were enough to consider you're safe.

People behave as if there were not multiple cases of abuse of PKI.

People behave as if all those whistleblowing cases exposing widespread illegal activities by the state were not treated as normal, except those exposing them being chased and vilified.

What I'm trying to say is that we're past the stage where techno-optimism about the Internet made sense. They just say in the news that abusing you is good, and everybody just takes it.

[–] pcouy@lemmy.pierre-couy.fr 25 points 19 hours ago

I did not have the money to pay the insane amounts these greedy for-profit certificate authorities asked, so I only remember the pain of trying to setup my self-signed root certificate on my several devices/browsers, and then being unable to recover my private key because I went over the top with securing it.

[–] laxe@lemmy.world 12 points 13 hours ago

Huge impact on a tiny budget - that’s extremely impressive. The world could be so much better without rent seeking parasites.

[–] somenonewho@feddit.org 36 points 18 hours ago

Damn! That's definitely a "I'm old" moment for me. I still remember when I first heard about the concept and I remember setting it up the first time on a self hosted project (which seemed harder back then).

Awesome project!

[–] noxy@yiffit.net 6 points 13 hours ago

Underrated. Stuff rocks.

[–] RoyaltyInTraining@lemmy.world 16 points 17 hours ago (3 children)

Let's Encrypt is amazing, but are there any equally trustworthy alternatives people could switch to if something bad happens to it?

[–] treadful@lemmy.zip 12 points 15 hours ago (1 children)

They came up with the ACME protocol, so presumably somebody could. The real barrier to entry is the cost of getting into that certificate chain of trust. I have no idea why it's so difficult and expensive.

[–] xthexder@l.sw0.com 11 points 13 hours ago (1 children)

Well, it's difficult, as it should be, because if you control a certificate in the active chain of trust of browsers, you can hack pretty much anything you want.

[–] treadful@lemmy.zip 2 points 13 hours ago (1 children)

Correct me if I'm wrong, but isn't the CA only signing your public key to prove identity/authority? I don't think the CA can magically MITM every cert they sign.

The impact is serious enough to warrant a $1m entry fee, IMO. At best, someone could impersonate a site. They'd also have to get other things in line (e.g. DNS hijacking) to be at all successful anyway. And it's not like most people are authenticating certs themselves. They just trust browsers to trust CAs that vouch for you and prevents those scary browser warnings.

It doesn't improve encryption compared to a self-signed cert though.

[–] xthexder@l.sw0.com 7 points 12 hours ago* (last edited 12 hours ago)

If you are the CA, you can sign a new certificate yourself for google.com and the browser will accept it. It's effectively allows MITM for any certificate. Worse, it's not even limited to certificates under that CA. The browser has no way of knowing there's 2 "valid" certs at once, and in fact that is allowed regardless (multiple servers with different instances of the SSL cert is a possibility).

Certificate pinning might save things, since that will force the same certificate as was previously used, but I'm not sure this is a common default.

[–] fmstrat@lemmy.nowsci.com 8 points 17 hours ago (1 children)

If it begins to enshitify, someone will quickly take up the helm. It's become so core now that someone like Cloudflare would just be like "We do this now."

[–] CosmicTurtle0@lemmy.dbzer0.com 8 points 16 hours ago (1 children)

Cloudflare sort of provides this now by being a MITM to secure your site between your server and the end user. But this requires you and your end user to trust Cloudflare.

And fwiw the ACME protocol is open so anyone can implement it. I believe even the ACME software that EFF sends out allows you to choose your server with some configuration.

[–] fmstrat@lemmy.nowsci.com 1 points 3 hours ago

Yup, it does. I think I still have my server hard coded from when it first launched.

[–] Laser@feddit.org 6 points 17 hours ago (1 children)
[–] Redjard@lemmy.dbzer0.com 1 points 8 hours ago (1 children)

They don't offer wildcard certs, but otherwise I think they are.
I wanna say acme.sh defaults to them.

[–] Laser@feddit.org 1 points 8 hours ago

Never used them, but they state at https://zerossl.com/features/acme/ that their free acme certs include wildcards.

[–] crusa187@lemmy.ml 6 points 18 hours ago

Yay for their glorious, free trusted ssl certs. Love this project!