TE
TechEcho
Home24h TopNewestBestAskShowJobs
GitHubTwitter
Home

TechEcho

A tech news platform built with Next.js, providing global tech news and discussions.

GitHubTwitter

Home

HomeNewestBestAskShowJobs

Resources

HackerNews APIOriginal HackerNewsNext.js

© 2025 TechEcho. All rights reserved.

Our First Certificate Is Now Live

1131 pointsby joshmozover 9 years ago

28 comments

Someone1234over 9 years ago
This is a tiny bit odd. So they have issued their first certificate, but they don&#x27;t have cross-signing in place yet? So between now and november 16th they&#x27;ll be issuing a whole bunch of effectively broken certificates unless people manually install their root CA?<p>Why even push this today if you don&#x27;t have cross-signing available? Without that Let&#x27;s Encrypt is effectively broken out of the box.<p>PS - I actually like Let&#x27;s Encrypt and the work they&#x27;re doing. I will be all queued up when they go live to grab one (and, yes, will put my money where my mouth is and donate). But doing this today without cross-signing seems strange.
评论 #10217807 未加载
评论 #10217641 未加载
评论 #10217604 未加载
评论 #10217601 未加载
评论 #10217700 未加载
评论 #10217854 未加载
评论 #10218541 未加载
评论 #10217707 未加载
jonkneeover 9 years ago
It&#x27;s amazing that it takes a free provider to make things simple:<p><a href="https:&#x2F;&#x2F;letsencrypt.org&#x2F;howitworks&#x2F;" rel="nofollow">https:&#x2F;&#x2F;letsencrypt.org&#x2F;howitworks&#x2F;</a><p>I&#x27;d actually pay more than I do now for SSL certs to get that kind of simplicity.
评论 #10217972 未加载
评论 #10217913 未加载
评论 #10218247 未加载
评论 #10219180 未加载
andrewstuart2over 9 years ago
I&#x27;m so excited for this to take off, and it&#x27;s good to see they&#x27;ve taken the first steps, but can I at least download the <i>CA Cert</i> over HTTPS? Not sure how comfortable I am installing a CA cert I downloaded via HTTP, since that&#x27;s kind of the whole point of this whole thing.
评论 #10217592 未加载
评论 #10217605 未加载
评论 #10218810 未加载
simula67over 9 years ago
Sorry for asking a potentially dumb question : but is it possible for me to set up a domain name thecitibank.com and ask letsencrypt to issue me a certificate ? I can then create a login page to steal IPINs. Isn&#x27;t that why we have humans in the loop for issuing certificates ?
评论 #10219197 未加载
评论 #10219193 未加载
评论 #10219289 未加载
评论 #10219186 未加载
评论 #10219234 未加载
评论 #10219188 未加载
MertsAover 9 years ago
What&#x27;s the target audience of the beta program? I&#x27;d love to play around with this on a personal domain but I doubt that there will be more than 2 or 3 unique visitors between now and general availability. Do they want signups for the beta program irrespective of the traffic volume of the site or would toy site signups just be more of a hassle for someone to approve?<p>The verbiage on that page isn&#x27;t very clear on if there&#x27;s some manual process for approving beta participants or if it&#x27;s just grab 100 entries a week out of a Google Sheets page.
评论 #10222270 未加载
评论 #10222271 未加载
RyanZAGover 9 years ago
Does anybody know if there is any protection built in against MITM or DNS poisoning attacks?<p>It feels like this makes network hop security far more important. If I&#x27;m able to insert a MITM or DNS poisoning anywhere between where letsencrypt.org&#x27;s servers are and where it thinks the requesting server should be then I can generate a false certificate.<p>For example, Amazon&#x27;s DNS resolves for letsencrypt as 1.2.3.4 which routes along a set path - say 2.3.4.5 and 3.4.5.6. To verify that I control amazon.com, letsencrypt is going to try and fetch <a href="http:&#x2F;&#x2F;1.2.3.4&#x2F;something" rel="nofollow">http:&#x2F;&#x2F;1.2.3.4&#x2F;something</a> (through DNS resolving). If I can get MITM access on 2.3.4.5 and pass back &#x2F;something to the request, letsencrypt is going to generate a certificate for me that I can use to say I am amazon.com for the entire world.<p>Is there any protection against this built into letsencrypt for this? Maybe checking if amazon.com already has <a href="https:&#x2F;&#x2F;" rel="nofollow">https:&#x2F;&#x2F;</a> ? Although I&#x27;m not sure if there is any way to get around a DNS poisoning attack...<p>In essence, this seems to mean that you can take a single successful MITM and turn it into a globally authorized MITM. Right?
评论 #10217894 未加载
评论 #10217986 未加载
评论 #10218275 未加载
评论 #10217886 未加载
ck2over 9 years ago
Everyone repeat after me, wildcards, wildcards, wildcards.<p>(just hoping they will appear next year)<p>One more nail in the coffin of the ssl cert mafia.
评论 #10217858 未加载
评论 #10217898 未加载
评论 #10217826 未加载
评论 #10218405 未加载
评论 #10217822 未加载
评论 #10217759 未加载
bluesmoonover 9 years ago
Quick question, apart from having a prettier website, what&#x27;s the differentiator with StartSSL which is also free, automated, and open?
评论 #10218277 未加载
评论 #10218316 未加载
评论 #10219475 未加载
评论 #10218793 未加载
eric_bullingtonover 9 years ago
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512<p>For the record, the cert I&#x27;ve downloaded (using SSL over the Let&#x27;s Encrypt site) from the Let&#x27;s Encrypt site has the following SHA256 fingerprint:<p>SHA256 Fingerprint=96:BC:EC:06:26:49:76:F3:74:60:77:9A:CF:28:C5:A7:CF:E8:A3:C0:AA:E1:1A:8F:FC:EE:05:C0:BD:DF:08:C6<p>Works great. To install on Firefox, just click on the first certificate listed here, in der format (just be sure to &#x27;view certificate&#x27; and compare with the SHA256 hash I list above): <a href="https:&#x2F;&#x2F;letsencrypt.org&#x2F;certificates&#x2F;" rel="nofollow">https:&#x2F;&#x2F;letsencrypt.org&#x2F;certificates&#x2F;</a><p>For Chrome users, you have to download the cert, then go under &quot;Manage Certificates&quot; in &quot;Advanced Settings&quot;. Then click the &quot;Authorities&quot; tab and import button. To check the cert hash, you&#x27;ll have to run the following on OpenSSL: You can check your own fingerprint using: openssl x509 -fingerprint -sha256 -in isrgrootx1.pem<p>Command line users on Ubuntu and (I think) Debian can install it to all browsers at once using: chmod 644 isgrootx1.pem sudo mkdir &#x2F;usr&#x2F;share&#x2F;ca-certificates&#x2F;letsencrypt.org sudo cp isrgrootx1.pem &#x2F;usr&#x2F;share&#x2F;ca-certificates&#x2F;letsencrypt.org&#x2F;isrgrootx1.crt sudo dpkg-reconfigure ca-certificates<p>For the extra paranoid, this is the same cert that another user posted to a Github gist earlier this summer: <a href="https:&#x2F;&#x2F;gist.github.com&#x2F;rmoriz&#x2F;1211745a21bc6114e770" rel="nofollow">https:&#x2F;&#x2F;gist.github.com&#x2F;rmoriz&#x2F;1211745a21bc6114e770</a><p>And you can verify my GPG signature by fetching my PGP key here (note that the keybase profile is linked to this HN username): <a href="https:&#x2F;&#x2F;keybase.io&#x2F;esbullington" rel="nofollow">https:&#x2F;&#x2F;keybase.io&#x2F;esbullington</a><p>-----BEGIN PGP SIGNATURE----- Version: GnuPG v1<p>iQIcBAEBCgAGBQJV95CmAAoJELGyxBAnWFiCpF4P&#x2F;0sxqdrobdKm02V2cadHWQX3 AqXEENlPoReoVazf6Xhr3xfcyLw7g798q7YG4Bd0XtZLwofTr8Hq2On4q9w6dufu 6yGv+PyBTqL2EiSvuyY1p29ieYJV3tqOLUTaYjlvf7YGS90wLphRsEF1RVOaKfLK J1HSfx5Gctl1IRqa3Lt4zK6pot8xOzvV2d6V+fW1V&#x2F;Svx5ZrfEUgJ7hgcyrgCSzB wqKJNhpoZCK50iqzrBlwjByRA+yi4LJckzSZ97l2p86QfvSg8xeVuMWVT+Qw6Pll Lw+rlrh4sLtcVGTcc6qUfBa5FXfoNOfT0vL009uBz5UkCs0vTjmbOwfZTGAMxKgC fD9dfOY3f9lA87nxTCP7nKR&#x2F;USbDJANztNdQ&#x2F;14qJwKFVmdusAjvf8LR8MzaIi5Q aBiC6otSuAMDGOTPXJ3aex&#x2F;v+pt1412K5CgLEq83zeTGK04OoEWV&#x2F;MMzggT+UxH6 eUpChtwKtFQIjqagzhkWWgc6ti2Qy0PnvZZa36PfFa01iK4jOhRPH9aCkg5UQtbl MjMPF2gAbHwTGP8cSs+PIrFUYyEK8FgWW4HhXBVCbNgedIEjRJwuorr&#x2F;Ug8D7mJk kx+nFENVIsjEHUa5k64fYYc4eRX244jKORvYxH&#x2F;iwCvvpCaineBkVmXPIFGIBXqp EYdDJBWF&#x2F;PWfMvjFYHL3 =es48 -----END PGP SIGNATURE-----
评论 #10219490 未加载
TazeTSchnitzelover 9 years ago
Last year they did a talk at CCC. Well worth a watch.<p><a href="https:&#x2F;&#x2F;www.youtube.com&#x2F;watch?v=OZyXx8Ie4pA" rel="nofollow">https:&#x2F;&#x2F;www.youtube.com&#x2F;watch?v=OZyXx8Ie4pA</a>
bdammover 9 years ago
This whole effort is making me a little bit giddy! Viva la admin-friendly security!
hartatorover 9 years ago
Getting NET::ERR_CERT_AUTHORITY_INVALID on <a href="https:&#x2F;&#x2F;helloworld.letsencrypt.org&#x2F;" rel="nofollow">https:&#x2F;&#x2F;helloworld.letsencrypt.org&#x2F;</a>
评论 #10217953 未加载
评论 #10217954 未加载
icc97over 9 years ago
Any one else getting a &#x27;Secure Connection Failed&#x27; error at <a href="https:&#x2F;&#x2F;helloworld.letsencrypt.org&#x2F;" rel="nofollow">https:&#x2F;&#x2F;helloworld.letsencrypt.org&#x2F;</a> in FF after adding the root certificate?
评论 #10220008 未加载
评论 #10219515 未加载
chmikeover 9 years ago
I didn&#x27;t see anything about the price of the certificates. Will it be free ?
评论 #10219160 未加载
charonn0over 9 years ago
I checked the https demo using libcurl, and it failed unexpectedly with error code 35 (Unknown SSL connect error). I was expecting curl error 60 (untrusted certificate).
评论 #10218398 未加载
stulligover 9 years ago
I still don&#x27;t get why Mozilla and Google don&#x27;t accept CACerts. Couldn&#x27;t a lot of this be solved by just removing the warnings?
评论 #10219669 未加载
thingsilearnedover 9 years ago
Congrats Josh and team!!!!
Walkmanover 9 years ago
How a root CA goes into the trust store? I know Firefox embed them, so older versions of it will not include it. OS minor updates (Windows, OS X, ...) ever updates the trust store?<p>How much time actually takes it before I can safely use it and be sure that the majority of browsers accept it?
评论 #10218822 未加载
mahouseover 9 years ago
I feel like these initiatives to make SSL available for everybody just lead to the same conclusion: EV will be the only viable alternative to show real trust, and EV is much, much more expensive than regular SSL ever was.
评论 #10218289 未加载
评论 #10218091 未加载
评论 #10218353 未加载
octatoanover 9 years ago
Does anyone familiar with the &quot;paid-for certificate industry&quot; know if anything major is going to happen? I&#x27;d guess they&#x27;re going to be inundated with lawsuits or something.<p>Great work, by the way.
r0bbboover 9 years ago
Can anyone explain to me what the difficulties of producing secure certs are? What steps do you need to go through to get root CA approval?
评论 #10223222 未加载
thomasrossiover 9 years ago
I seem to understand this works just fine with HSTS. I am wondering what happens to key-pinning?
评论 #10223228 未加载
stevewilhelmover 9 years ago
Anyone tried installing their certificates on AWS or Heroku?
评论 #10223232 未加载
muyuuover 9 years ago
Can this be used for .onion sites?
评论 #10223169 未加载
acdover 9 years ago
Is there any possibility of peer2peer voting&#x2F;vetting for certificate genuity?
评论 #10219878 未加载
cbpyover 9 years ago
you got to use Google to sign-up for the beta... ?
Julio-Guerraover 9 years ago
why aren&#x27;t they sponsored by google nor facebook...? isn&#x27;t it the only way today to support &quot;open internet&quot; ?
lifeisstillgoodover 9 years ago
To be honest I had not heard of them till now, and I am a bit confused even after reading some of their site...<p>So if the difficult part of being a CA (which I think is verifying that I, Paul Brian, own and control the rights to barlcaysbank.com and should have a certificate in that name) if that bit is either not done (!) or is reliant on donations to be able to afford it, is this going to work?
评论 #10217656 未加载
评论 #10218640 未加载