TE
TechEcho
Home24h TopNewestBestAskShowJobs
GitHubTwitter
Home

TechEcho

A tech news platform built with Next.js, providing global tech news and discussions.

GitHubTwitter

Home

HomeNewestBestAskShowJobs

Resources

HackerNews APIOriginal HackerNewsNext.js

© 2025 TechEcho. All rights reserved.

OverEncrypt: going beyond LetsEncrypt's HTTPS security defaults

126 pointsby mapmeldover 8 years ago

4 comments

pfgover 8 years ago
These HPKP instructions are rather dangerous (as in: more dangerous than they have to be).<p>The hash is for the ISRG root certificate, which is not widely trusted yet. While an ISRG-signed intermediate certificate is available, all clients currently default to the IdenTrust-signed intermediate, and even if you decide to use the other intermediate instead (or both, which most browsers can handle), that doesn&#x27;t guarantee that browser build a trust path through that intermediate - it might have the other one cached from a different site. In other words, the second pin would almost never be satisfied, which means you&#x27;re screwed once your private key is compromised or changes. Screwed as in your domain is bricked for up to 30 days with this max-age setting.<p>A slightly better approach would be to pin to both the ISRG and the IdenTrust root[1], plus your private key and a couple of backup keys that you keep offline. One or two backup pins to other CAs couldn&#x27;t hurt either. Oh, and best run with Report-Only for a while.<p>[1]: <a href="https:&#x2F;&#x2F;www.identrust.com&#x2F;certificates&#x2F;trustid&#x2F;root-download-x3.html" rel="nofollow">https:&#x2F;&#x2F;www.identrust.com&#x2F;certificates&#x2F;trustid&#x2F;root-download...</a>
walrus01over 8 years ago
This is rather overly complicated and should only be used for test domains you do not care about.<p>Much easier and very effective is to use the apache2 or nginx config file options to manually disable sslv3, tls1.0 and tls 1.1. Permit only TLS 1.2. If you want to, manually specify the preferred order or crypto.<p>Any modern browser supports TLS 1.2 just fine. I&#x27;ve done this for every httpd I admin and it has had no effect on reachability.
评论 #13078149 未加载
l-pover 8 years ago
Your best option is probably to read, understand, and use the configs at <a href="https:&#x2F;&#x2F;cipherli.st" rel="nofollow">https:&#x2F;&#x2F;cipherli.st</a>
mangixover 8 years ago
Anyone else notice the SysV subtlety on the bottom?
评论 #13074881 未加载
评论 #13074811 未加载