TE
TechEcho
Home24h TopNewestBestAskShowJobs
GitHubTwitter
Home

TechEcho

A tech news platform built with Next.js, providing global tech news and discussions.

GitHubTwitter

Home

HomeNewestBestAskShowJobs

Resources

HackerNews APIOriginal HackerNewsNext.js

© 2025 TechEcho. All rights reserved.

Let’s not encrypt (2019)

45 pointsby AndroidKitKatover 1 year ago

25 comments

janosdebugsover 1 year ago
I&#x27;m always baffled by people arguing that we shouldn&#x27;t use HTTPS. Have these people forgotten the times when mobile providers would &quot;optimize&quot; images (=compress them to death) or even insert advertisements? Or the times when simply being on the same network as someone with alterior motives could lead to your credentials being stolen?<p>I get it, certificates are hard, but having free certificates by Letsencrypt has probably been one of the most beneficial things that happened to the Internet in the last 10 years. If someone doesn&#x27;t like it, please put in the work to come up with a better solution, not arguing for an even worse solution.<p>The author of this article doesn&#x27;t propose anything workable. Mentioning SSH is ridiculous, it&#x27;s not meant to access servers you don&#x27;t know. Also, I have seen more than a few sysadmins who would easily be tripped up by a MITM because they&#x27;d just wipe their know hosts file at the first sign of trouble. And these are TRAINED people.
评论 #37263113 未加载
评论 #37263061 未加载
评论 #37263084 未加载
评论 #37263007 未加载
czaritover 1 year ago
TLS solves <i>two</i> problems, but was originally designed to solve <i>three</i>. The author seems to be annoyed that it does not solve the third problem.<p>TLS (or SSL, really) was designed to solve trusted authentication - that you could be sure the website that responded to your request was your bank. The idea was that a manual review from an authority would verify that the owner of certificate x was the &quot;real&quot; y, for some definition of x, y, real and authority.<p>It does not solve that problem, I agree.<p>It does, however, solve two other problems: The problem of message integrity - noone intercepted and changed this message between server and client; and the problem of eavesdropping - noone can read the message by observing the network traffic alone.<p>Now, of course, this all depends on the fact that the connection was setup correctly, and a man-in-the-middle attack that can redirect all the traffic for some domain to their own servers would <i>possibly</i> succeed. But that is quite a high bar! Modifying DNS or shaping network traffic in that way requires deep access, and is much, much harder than attacks with no SSL&#x2F;TLS.
评论 #37263247 未加载
评论 #37263896 未加载
rollcatover 1 year ago
The author recommends TOFU as an alternative. TOFU is great until it isn&#x27;t. Web servers do get hacked all the time (mostly thanks to Wordpress), and when they do, rotating any and all private keys is high on your action list (preferably through nuking the machine from the orbit).<p>The short expiration date on the certificate is specifically meant to address this problem. CRLs don&#x27;t work, not even by principle - how often are you meant to refresh them? Who&#x27;s volunteering to handle the load?<p>Which circles us back to the underpinning of the fundamental problem: DNS is insecure. If DNSSEC was to be the answer, where is it, 20 years in? Can we pretty please adopt DNSCurve instead already?
评论 #37263421 未加载
StarlightAboveover 1 year ago
&gt; And, as always with the certificate authorities, a thousand murderous theocracies, advertising companies, and international spy organizations are allowed to impersonate you by design.<p>Certificate transparency has been required by chrome for new certificates (and sites that opted in) since 2018, and all older certificates expired by 2021 (because certificates have a maximum allowable lifetime). So this was dubious even at time of writing, and outright false today, for a large majority of users.<p>&gt; Let&#x27;s Encrypt isn&#x27;t free to run, either. Their 2019 operating budget is 3.6 million U.S. dollars. Most of that is donated by… guess who? Your competitors.<p>Let&#x27;s Encrypt has something like 80 sponsors listed. The vast majority of them are not, actually, competing with you. Even if some of them are, the nature of a non-profit funded by a wide range of sponsors just makes it a terrible way to attack someone.
torstenvlover 1 year ago
&gt; <i>The certificates provide no security</i><p>Uh... it guarantees that the entity you&#x27;re communicating with is the one with control over the web server you&#x27;re trying to access.<p>The points about HTTP are worthless. Everyone&#x27;s web traffic should be E2EE for everything. I don&#x27;t understand someone arguing that it should be possible to spy on other people on your network.
remramover 1 year ago
While some of this article makes sense, it is full of exaggerations and outright lies.<p>If you want longer-lived certificates manually, don&#x27;t use Let&#x27;s Encrypt. Why pretend that no other issuer exists?<p>&gt; You don&#x27;t have to use certbot (...) you can renew certificates manually<p>Or use a different client? Do we pretend these don&#x27;t exist, too? <a href="https:&#x2F;&#x2F;letsencrypt.org&#x2F;docs&#x2F;client-options&#x2F;" rel="nofollow noreferrer">https:&#x2F;&#x2F;letsencrypt.org&#x2F;docs&#x2F;client-options&#x2F;</a><p>&gt; If you have a hundred websites, then on average that&#x27;s four hundred renewals a year—more than one every day. Every single day. For the rest of your life.<p>Right, because you can&#x27;t renew more than one on the same day? You can&#x27;t do your 100 renewals and go on vacation for 90 days? Why not? That&#x27;s just not how averages work.<p>&gt; Normally, when a site changes URLs, you can use a redirect to send visitors to the new address. But, if the old address is HTTPS, that doesn&#x27;t work: the old address will display a misleading security warning instead of redirecting.<p>That too is an outright fabrication. I just tried a 301 redirect from HTTPS to HTTP and it worked fine, on up-to-date Firefox, no security warning. Maybe the author promised to never get rid of TLS with a `Strict-Transport-Security` header? Don&#x27;t do that?<p>&gt; When you install a certificate with a three-month expiration date, you&#x27;re saying “I want my website to break in three months unless I show up and tell it not to.”<p>Is that how you feel about permits, licenses, subscriptions? Fixed-time contractors? A &quot;real engineer&quot; wouldn&#x27;t use anything time-limited?<p>&gt; save the certificate permanently the first time you connect<p>That&#x27;s the final recommendation? After the author concluded that &quot;certificates provide no security&quot; in the second paragraph because they might man-in-the-middle the challenge? Are we supposed to ignore that they might man-in-the-middle that first connection?
评论 #37263935 未加载
seaerkinover 1 year ago
I think the true problem here is associating the word secure with https. It provides a false sense of security when the site served over https is a scam or phishing site, but very few non-technical users understand the difference.
AndroidKitKatover 1 year ago
While I don&#x27;t agree with everything in the post, I still found it thought provoking. I&#x27;ll still be serving my sites with HTTPS.
cozzydover 1 year ago
The really annoying thing is how browsers treat self-signed certificates as some dangerous thing, when it&#x27;s really much safer (no MITM or eavesdropping) than http.
评论 #37263491 未加载
winter_blueover 1 year ago
&gt; The official way to renew Let&#x27;s Encrypt certificates is automatically, with a tool called certbot. It downloads a bunch of untrusted data from the web, and then feeds that data into your web server, all as root. If that sounds dumb, then good for you, because it is.<p>I&#x27;m a bit confused by this. I use Caddy, and Caddy doesn&#x27;t run in root – and Caddy is able to handle automatic Let&#x27;s Encrypt certificate renewal.<p>Why does certbot need root?
评论 #37263219 未加载
评论 #37263112 未加载
评论 #37263154 未加载
hughwover 1 year ago
The MITM observation isn&#x27;t any more dangerous than Trust on First Use. The attacker would have to identify you as a target and set up their MITM before you got around to setting up your own cert. Sort of like an attacker compromising your SSH server before the first time you got around to connecting a client and trusting the key.
评论 #37263063 未加载
CaptainFeverover 1 year ago
Thought-provoking. I didn&#x27;t consider why LE is free (sponsored by Google and AWS) and that it can technically change that at any time. I&#x27;m still going to continue using HTTPS for now since it&#x27;s my status quo, but I guess, for public websites, the choice to use HTTPS or not depends on whether or not one agrees that widespread HTTPS is vital to discourage ISP&#x2F;government snooping.<p>I disagree with the TOFU recommendation, though. From my knowledge, it kinda works for SSH since you&#x27;re mainly connecting to servers you control; not so much for the WWW. Anyone remember MonkeySphere? I also disagree with the 3-month criticism. I think LE has a good justification for it: usually, renewal is either automated or forgotten about, so a short timespan forces automation. The bomb analogy doesn&#x27;t really make sense as certificate expiry serves a practical purpose unlike a bridge-bomb.
评论 #37262992 未加载
jayskiover 1 year ago
Everyone that uses letsencrypt has a cron installed to auto-renew. Certbot needs two permissions to work:<p>1. perform the necessary verification, of which there are many, placing a file on your website is just one possibility.<p>2. place the generated certificates in some location where the webserver can read them.<p>Neither of these steps requires root if you know what youre doing.
paganelover 1 year ago
Unfortunately by this point is a losing battle, most techies have been conditioned to believe that serving unencrypted raw HTML, HTML which contains no confidential information in it, might as well make the Dark Forces of Evil win. &quot;What if someone MITM-es your recipes blog?&quot;.<p>Of course, it just happens that this let&#x27;s encrypt push puts even more power in the hands of Google, the owner of Chrome. I would have said something about that, too, but yesterday someone re-posted the HN guidelines and I&#x27;m not up for another fight with Google engineers comp-ed 600k and up, engineers who are very eager to anonymously defend their employer online.
评论 #37263116 未加载
评论 #37263108 未加载
meehoover 1 year ago
&gt; The way you verify your identity to Let&#x27;s Encrypt is the same as with other certificate authorities: you don&#x27;t really. You place a file somewhere on your website, and they access that file over plain HTTP to verify that you own the website. The one attack that signed certificates are meant to prevent is a man-in-the-middle attack. But if someone is able to perform a man-in-the-middle attack against your website, then he can intercept the certificate verification, too. In other words, Let&#x27;s Encrypt certificates don&#x27;t stop the one thing they&#x27;re supposed to stop.<p>Doesn&#x27;t ssl handshake require knowing the private key?
评论 #37263213 未加载
评论 #37262969 未加载
评论 #37263020 未加载
occamrazorover 1 year ago
OP keeps repeating tha Google is making money from certificates. I don&#x27;t think Google sells certificates, and even if they do the revenue is insignificant for them. Does anybody know what OP may be referring to?
评论 #37263554 未加载
ThePowerOfFuetover 1 year ago
Not touched in three years, and full of FUD.<p>We should do better on HN.
notpushkinover 1 year ago
Can&#x27;t say I fully agree, but I definitely share the sentiment. Let&#x27;s Encrypt is a nice hack, not a long-term solution. We need DANE.<p><a href="https:&#x2F;&#x2F;en.wikipedia.org&#x2F;wiki&#x2F;DNS-based_Authentication_of_Named_Entities" rel="nofollow noreferrer">https:&#x2F;&#x2F;en.wikipedia.org&#x2F;wiki&#x2F;DNS-based_Authentication_of_Na...</a>
Pannoniaeover 1 year ago
Even worse, HTTP&#x2F;2 and HTTP&#x2F;3 (and basically every new web technology) is only usable over HTTPS. I&#x27;m seriously starting to question the agenda behind this, this is not beneficial to the users in any way.<p>Self-signed certs should fine (if you validate them initially) but browsers make self-signed sites almost impossible to access, relying on Let&#x27;s Encrypt or being subject to extortion is a shameful state for the web.<p>Also, what&#x27;s with the ever-shrinking renewal periods? Why can&#x27;t a certificate be valid for 10 years? They can revoke it anyway if it&#x27;s been compromised or whatever.
评论 #37264256 未加载
评论 #37263083 未加载
评论 #37263098 未加载
评论 #37263194 未加载
评论 #37263155 未加载
评论 #37263164 未加载
colesantiagoover 1 year ago
Should I be concerned if a payments processor or a SaaS business is using Lets Encrypt?
评论 #37262828 未加载
johneaover 1 year ago
I have to agree. HTTPS everywhere is security circus...
JohnFenover 1 year ago
I&#x27;m also not a fan of LE, for some (but not all) of the reasons stated here. I particularly hate the short cert lifetimes (that they intend to make even shorter).
评论 #37262907 未加载
评论 #37262948 未加载
cryptonectorover 1 year ago
There&#x27;s a lot of nonsense in TFA.
superdeedaover 1 year ago
[2019]
评论 #37262705 未加载
devrandover 1 year ago
&gt; But if someone is able to perform a man-in-the-middle attack against your website, then he can intercept the certificate verification, too. In other words, Let&#x27;s Encrypt certificates don&#x27;t stop the one thing they&#x27;re supposed to stop.<p>I guess? But they later state that SSH&#x27;s trust on first use is the solution... which has the same problem. Am I connecting to the real bank website or a fake one? Who knows! But I&#x27;m going to trust it forever.<p>Additionally, most man-in-the-middle attacks occur on the client side (ex. some local network is compromised), which is still prevented here. You would need to man-in-the-middle from LE&#x27;s perspective.<p>&gt; “But you don&#x27;t have to use certbot,” say the people who haven&#x27;t thought very hard about it. And they&#x27;re right: you always have options. You can renew certificates manually, but<p>Why the fuck did they link to the Youtube HQ shooting here? Anyway, they also link to a bunch of clients that don&#x27;t do manual renewal.<p>&gt; The entire certificate authority system is a for-profit scam. It imparts no security whatsoever. But Google gets its money, so it&#x27;s happy.<p>I&#x27;m sorry, how is Google getting money from PKI? In the previous section they actually implied that Google might drop Let&#x27;s Encrypt in order to have their own CA make money. So which one is it?<p>I know this was written in 2019, but since then Google has entered the market (<a href="https:&#x2F;&#x2F;pki.goog&#x2F;" rel="nofollow noreferrer">https:&#x2F;&#x2F;pki.goog&#x2F;</a>), but they didn&#x27;t boot Let&#x27;s Encrypt. In fact, they adopted ACME and provide certificates for free as well. So they&#x27;re still not making money from it.<p>&gt; what to do about it &gt; Not this time. The technical problems are easy to solve. For decades, users of SSH have had a system (save the certificate permanently the first time you connect, and warn if it ever changes) that is optimal in a sense: it works at least as well as any other solution. It&#x27;s trivial to implement, is completely free, involves no third parties, and lasts forever. To the surprise of absolutely no one, web browsers don&#x27;t support it.<p>This author has no concept of the real-world. Prompting users to accept a certificate on first use is just going to cause them to always click &quot;trust&quot; since the other option will always break what they&#x27;re trying to do. A website can then never rotate that certificate without breaking every user that visited their site before. So if the certificate does leak, someone now how boundless ability to MITM everyone that has visited the site, and anyone not MITM&#x27;d will now get a security error.<p>Overall this article constantly contradicts itself and merely presents out a poorly thought-out solution as the answer.