So...
Why's The Reg still holding out?
The Let's Encrypt project has opened to the public, allowing anyone to obtain free TLS certificates and set up HTTPS websites in a few simple steps. It's a major leap forward in encrypting the world's web traffic, keeping people's information and browser histories out of the hands of eavesdroppers and and other miscreants. …
Yes, it would be nice if {accounts|forum}.theregister.co.uk were TLS'd. Thing is, the cookie is carried over to the www site too, it appears. Our techies are working are hard as they can.
As for the ad networks – we use a mix of them. Not all of them do HTTPS.
Believe me, we do want to get encrypted.
C.
Explained in another thread, but for a TLDR: ensuring the infrastructure can work under TLS, mainly - not "only" ads.
True, we'll likely get a smaller pool of ads able to be served under TLS, but that's not all that important.
Tech-wise, it's important that the user experience doesn't break if people use things like HTTPS Everywhere, or if one day we pull the HSTS trigger. And since a lot of commentards are the tech-savvy kind which try to - and do - break things or do unconventional stuff, we ought to be very well prepared.
If it were as easy as pushing a button, we'd have done it donkeys ago.
Thus, Soon®
Been waiting for this to go public, ever since i first read about in on El Reg, many moons ago. T'will save me having to explain to the couple of people I host sites for that the "self signed certificate" error they see when logging into WordPress admin [I know!] are nothing to worry about.
Off to try it now.
Don't get too excited. Great in theory but most of us use control panels to administer our websites. They already have facilities to manage cerificates and those will mostly not match up with the client here which has the deluded belief that it, and it alone, should control your apache configuration files. It don't and the configuration file will likely be overwritten by your control panel when you do something else - breaking your https installation. That basically KOs your sites.
You can do it manually but then you have remember to renew the certificate every 60 days which makes this somewhat more of a bind(!) than the existing free providers albeit my favourites are Russian & Chinese.
When your chosen control panel integrates Let's Encrypt ito its system it will be great but until then it may be best to wait.
I have a wildcard cert through COMODO for my colo'd server, runs maybe $150 a year or something(the cheapest one I could find) I forget, works fine for desktop but my android devices don't like it, so I have to install the cert on them to get them to trust it. There is a more expensive wildcard cert option through COMODO last time I checked which I bet had mobile support I just didn't want to pay that for my personal server (and I didn't want to use self signed since I give https links to other people and don't want the warnings to pop up etc)
So hopefully this service has a CA that is mobile-trusted.
Android wont like it because of your Cyper set-up on your server you need to sort that out, searching on Google for your server type ie Centos SSL Cipher Suite will yield the results you need. This site will show what works with your current SSl https://www.ssllabs.com/ssltest/
> I have a wildcard cert through COMODO for my colo'd server, runs maybe $150 a year or something(the cheapest one I could find) I forget, works fine for desktop but my android devices don't like it
Are you sure you don't need to install an intermediate CA cert in the server?
It is possible to run Exchange with 4 separate certs, instead of one cert with 3 SANs. You just have to make sure to load all certs and assign each cert to its own proper function. So much more work, but should be scriptable in ps.
Although I don't know lets encrypt schedule for windows client, I'm sure it is being worked on.
Those of us required to use Windoze appear to be out of luck
Cygwin might work, I guess, but easiest is probably to download a small live Linux distro and run the script in there. I don't suppose the script will produce configs for IIS or whatever you're running though. Still, you should be able to manually install the cert.
Anyway, some sort of live Linux distro (like Knoppix, especially) is a good tool to have handy even in an all-Windows shop. Using it to reset a forgotten admin password or removing a corrupt page file are a couple of applications that come to mind.
Which is all well and good but from their own words they wanted to make the whole process as simple and straightforward as possible. Installing a bunch of extras including unfamiliar languages isn't ideal nor line with how easy they're making it out to be.
(Also it's a tad difficult to run a live cd on a server in a bit farm without direct access to it or annoying customers with downtime)
@Sgt_Oddball:
I suggested a live CD so that you don't have to install anything. Maybe some packages need to be downloaded (into RAM), so it might take longer, but I'm sure it's all in the READMEs.
As for doing it on a server: don't! Stick a USB key into your laptop or whatever spare PC is to hand, boot from it, do the stuff needed to generate the cert and then copy it onto the secure server. It's not like you're going to be running this stuff (or any other configuration experiments) on a live production server, is it?
"Why would anybody want to run a web server on Windows ?"
About 1/4 the risk of being hacked versus a Linux system as it's relatively secure out of the box, and is much easier to admin / manage, has better performance for most uses on the same hardware with the latest Windows versions and has far simpler corporate integration.
Am I correct that this means handing out HTTPS certificates without verifying true identity, and without identifying ownership of the domain?
Customers use HTTPS not just for encryption but to identify that they are on an organization's legitimate website (bank, government, etc.), and not some imposter website.
If I'm correct in understanding that these certificates are being handed out without identity verification then public trust of HTTPS will soon be in jeopardy.
Oh come on, you can't really expect anyone to trust a root CA if it handed out any domain certificate to anyone? This isn't a back street operation.
If it is going to get allowed onto the trust list of all the major vendors then it has obviously got domain validation. It won't have EV where it checks your company, just that the domain is authorised.
See here if you want the technical details: https://letsencrypt.org/howitworks/technology/
Let's Encrypt verifies ownership of hostname by exchanging plain HTTP messages with content / paths unique enough, against the server you want to install the certificate on, and using the hostname you want the certificate for. So, either you are permitted to run your own script in the context of webserver to allow the exchange to succeed, or you are not. In the former case you are granted certificate for hostname (not organization, it is not part of the exchange, nor is in the certificate). In the latter case you cannot get the certificate.
It takes very little to use "very alike" names on servers you fully control and get a certificate for it using Let's Encrypt, I'm afraid.
The problem is "encryption" is just a proper subset of "security". There are other critical needs which Let's Encrypt doesn't fulfill - the main one is true "authentication", which is a basic features of certificates - they are called that name because they are more than "encryption keys".
I guess I'll remove Let's Encrypt CA from my systems because I will want to be notified of any cert from them.
You can get ssl certificates from many resellers (eg gandi) with the only requirement being proof that you control the domain by hosting a specific file at a specific path or adding a specific DNS record. In that respect lets encrypt is no different (other than the automation)
Well, domain certificates have never verified identity well -- the CAs are not qualified to make legal trademark decisions, for example. (Who is to say that Banko Famerica is not a perfectly common name in Whateverland?)
And as to control of the domain: I've not looked at the protocol yet, but I'm assuming you need to have DNS records in place and pointing to the IP the client is running on for every domain name you want in the certificate at the very least. (People with load balancers are big enough to pay, I'd guess.)
Still, the possible implications for shared hosting and dynamic dns are interesting. Time to pin your certs, I guess.
"Do you honestly believe that spammers are going to come after every individual with an e-mail inbox?"
Why, yes, I believe spammers will go after every inbox for which they can get an address. But, then, spam is practically free and doesn't involve voluminous court filings, so there ya go.
I'm amazed at how many banks need to contact me about security issues with my account that must be addressed immediately! If only I could remember when I established those accounts...
"browser histories out of the hands of eavesdroppers" - How does that work then? I was under the impression that https secures the content, but the requests still have to fly around for everyone to see do they not?
Plus anyone could always have created their own certificates for free any time they wanted to, the news here is that these ones are trusted by default by browsers. Hands up who actually feels secure when your browser automatically trusts a certificate? Tumbleweeds... We've all heard how these certificate authority operations more or less function. Now handing out "trustworthy" certificates to anyone with an email address helps the "web of trust" how exactly???
I want to be happy about this because of the names involved but... Maybe they are just poking fun at a ridiculous situation?
The DNS lookup is a separate request, and they may or may not have access to that. If they are looking at the https request, they only know the IP address, not the individual website or page on that website, though knowing the IP address and the size of the file coming back may give them some clues as to what you are doing.
Requests are encrypted - the only information an eavesdropper can obtain is the IP address of the server - not the pages you visit etc.
They only hand out certificates to people who can show possession of the domain associated with the certificate. The issues experienced in the past were with CAs who handed out certificates without checking that you actually controlled the domain in question. I fail to see why all the negativity ...
While I haven't read the protocol, it seem solid enough in my eyes. You need to own/pwn the domain and the server the IP resolves to.
And damn it's easy. And with the possibility to automate, it's a huge step up from another (cacert.org) which also was free but required work every 6 months, and wasn't in the browser/mail clients key chains.
I am mostly using it for mail encryption.
This post has been deleted by its author
Does this differ significantly from the service StartCom have offered for some years (and who I use for a few small domains)?
I've not found any major devices or browsers without their CA cert installed as a trusted root, but the process for getting the certs - which you have to renew annually or half-annually - is a bit more of a pain than this one sounds.
Yes this is different from startcom - the biggest difference is that they won't charge you to revoke or re-issue a certificate. They also automate the process including renewals.
Don't underestimate the automation either, this includes auto-configuring the server to use a strong setup, no weak default ciphers or protocols etc. The configurations will adapt as new ciphers emerge and old ones are deprecated. Most sites operating with encryption now are still using default configurations which render them insecure since many admins assume that simply having the certificate is enough.
First I read Kazakhstan want's to give people Certificates that they can SSL-Strip and now you've got another site, offering them similar for FREE under the banner of the EFF.. Do people understand how SSL-Stripping actually works and why it's a huge security problem?
(Thought-Crime)
You can't be serious, trust a third party CA?!?
You'd have to be either.. 1> Brain Damaged or 2> Phenomenally Stupid!
Quote 'LetEncrypt'; "and is recognized by the IRS as a tax-exempt organization under Section 501(c)(3) of the Internal Revenue Code" (all the more reason to trust them then!) Tax free "triangle" of Love!
It doesn't have to be complex, it just has to be secure enough to not leak side channel keys.
RSA - sadly doesn't fall into that category ever since SSL-Strip became a popular "hackers" toy along with MD5 collision!
Hacking the way into "Kerberos" and "SSL everywhere" with TCPCrypt that doesn't use RSA Key's is not oh so hacker friendly or ever so easy!
Yes you can, well sort of. You need to run the software, but you can prevent it from doing anything to your config. https://github.com/letsencrypt/letsencrypt
A bit down the page it says you should use ./letsencrypt-auto certonly --standalone [...]
That will seemingly not install anything. Only fetches the cert for you to do with as you please, from my understanding. (I wouldn't let some random tool meddle with my config either, but there'd always be backups and "diff" to trace the exact changes it made; plus it's open source, so probably not that hard to work out what it does)
My god, it's true: https://community.letsencrypt.org/t/maximum-and-minimum-certificate-lifetimes/264
So unless you want to manually update all your servers every 90 days (within a fairly narrow renewal window?) you'll want to install letsencrypt on all your servers as root. Or pay for your SSL certs. Or use HTTP.
From https://community.letsencrypt.org/t/frequently-asked-questions-faq/26#topic-title :
> Why does the Let’s Encrypt client require root privileges?
> The Let’s Encrypt client is essentially an operating system component. Generically, it requires root privileges to bind to port 443...
That's just BS.
Also.. the code is too complex for a quick audit. And it's Python, one step above PHP. There'll be none of this in my OS!
So renew it every month by cron - how hard can it be? Looks like a simple command to retreive a new cert, and then have a simple root script copy that into place and kick apache?
I haven't played with this yet - but I will do once my current change freeze is over...
I wonder if I can do wierd things with DreamHost?
"You can typically expect to pay for SSL certificates, although some authorities do offer freebies. None so far, to our knowledge, are as straightforward as Let's Encrypt's free service."
I know it's not directly analogous, but if an https website with http2/spdy is what you're after, it's between 1 and 3 clicks and less than a minute with Cloudflare. Which is also free. Nothing to install either.
This post has been deleted by its author