TE
科技回声
首页24小时热榜最新最佳问答展示工作
GitHubTwitter
首页

科技回声

基于 Next.js 构建的科技新闻平台,提供全球科技新闻和讨论内容。

GitHubTwitter

首页

首页最新最佳问答展示工作

资源链接

HackerNews API原版 HackerNewsNext.js

© 2025 科技回声. 版权所有。

Another free CA as an alternative to Let's Encrypt

652 点作者 Jaruzel将近 4 年前

18 条评论

throw0101a将近 4 年前
&gt; <i>I&#x27;m using the acme.sh client but the process will be similar no matter which client you choose to use.</i><p>Always nice to see some variety in clients along side the official Let&#x27;s Encrypt one.<p>While we do use the official Python-based client at works at times, whenever I install it via <i>apt</i>, and it pulls in a whole bunch of dependencies, it&#x27;s a bit disconcerting to me.<p>I&#x27;m a bit partial to <i>dehydrated</i>, which is a shell script (works under Bash and Zsh): I find it a lot easier to understand. It&#x27;s handy to put on Linux&#x2F;POSIX-based appliances like F5s, where the only prerequisites are Bash, cURL, and OpenSSL (and standard Unix tools like sed, grep, <i>etc</i>):<p>* <a href="https:&#x2F;&#x2F;devcentral.f5.com&#x2F;s&#x2F;articles&#x2F;lets-encrypt-on-a-big-ip" rel="nofollow">https:&#x2F;&#x2F;devcentral.f5.com&#x2F;s&#x2F;articles&#x2F;lets-encrypt-on-a-big-i...</a><p>* <a href="https:&#x2F;&#x2F;github.com&#x2F;EquateTechnologies&#x2F;dehydrated-bigip-ansible" rel="nofollow">https:&#x2F;&#x2F;github.com&#x2F;EquateTechnologies&#x2F;dehydrated-bigip-ansib...</a>
评论 #28245246 未加载
评论 #28245459 未加载
评论 #28245752 未加载
评论 #28251081 未加载
评论 #28254874 未加载
评论 #28248552 未加载
评论 #28245138 未加载
TekMol将近 4 年前
Can this one provide wildcard certificates without having to update DNS entries every three months?<p>That is the one pain point I have with Let&#x27;s Encrypt.<p>PS: Yes, you can automate the DNS updates. That <i>is</i> the paintpoint I am talking about. It is one more moving part. One more dependency on a third party. One more thing to set up. One more thing that can break. One more thing that will rot (APIs always change at some point in time).<p>Many people seem to solve the &quot;automate DNS&quot; by putting their DNS credentials on the server which serves their website. This is the worst thing from a security perspective. Now someone who breaks into your application can take over your DNS, point your domain to wherever they like <i>and</i> get any certificate for it they like. This probably enables them to also overtake your email and then escalate further from there.
评论 #28245666 未加载
评论 #28246471 未加载
评论 #28246184 未加载
评论 #28250666 未加载
评论 #28245415 未加载
评论 #28245420 未加载
评论 #28245437 未加载
评论 #28250571 未加载
评论 #28250928 未加载
评论 #28245492 未加载
评论 #28249473 未加载
Tepix将近 4 年前
I&#x27;d like to see a free CA for S&#x2F;MIME certificates once again.<p>Since more than a year or two, all the free S&#x2F;MIME certificates that you can get these days have issues:<p>- some of them a valid less than one year which is a huge hassle for S&#x2F;MIME as opposed to HTTPS because you need to keep all your old certificates around<p>- some of them will not let you use your own private key (I wish i was kidding)
评论 #28245558 未加载
foresto将近 4 年前
The screen shot recommends short passwords with one each of upper&#x2F;lower&#x2F;numeric&#x2F;special characters. This policy has never been good. I find it discouraging from a company offering security-related services.<p><a href="https:&#x2F;&#x2F;scotthelme.co.uk&#x2F;content&#x2F;images&#x2F;2021&#x2F;08&#x2F;image-3.png" rel="nofollow">https:&#x2F;&#x2F;scotthelme.co.uk&#x2F;content&#x2F;images&#x2F;2021&#x2F;08&#x2F;image-3.png</a>
评论 #28252954 未加载
d33将近 4 年前
Just curious... has anyone so far decided to extend the 3-month certificate expiration deadline? I understand that for the intended use case it makes sense, but in some cases it&#x27;s an overkill and having a CA support such use case could be useful. There&#x27;s nothing in the technology itself that prevents us from having certs that expire in, say, a year, right?
评论 #28244517 未加载
评论 #28244583 未加载
评论 #28244562 未加载
评论 #28245002 未加载
评论 #28244490 未加载
评论 #28244519 未加载
评论 #28245549 未加载
评论 #28245311 未加载
评论 #28244468 未加载
PinguTS将近 4 年前
The author said, he randomizes between the 4 free-of-charge SSL provides because of availability and reliability.<p>What me would interest, if it would be possible cross-sign the certificates by all of those 4 and automate this?
评论 #28244859 未加载
评论 #28245749 未加载
Tobu将近 4 年前
More interesting to me will be when one of the ACME CAs will implement RFC 8657, ACME-specific CAA parameters.<p>Currently privilege separation on a server or a TLS terminator doesn&#x27;t do much for ACME privileges because an exploit anywhere on the request path can use an arbitrary account to obtain new certs.<p>Binding to a single ACME account in DNS (accounturi=…) would significantly reduce the attack surface, as would requiring non-http validation methods.
评论 #28258520 未加载
patrakov将近 4 年前
Do I understand correctly that this event also means that ssl.com is the first CA to offer free ECC certificates to the general public?
评论 #28245301 未加载
评论 #28245730 未加载
edwinyzh将近 4 年前
It&#x27; great to have alternatives although I need nothing more than what Let&#x27;s Encrypt offers.<p>PS, do you think there is a chance for a similar service to be available in the future, but for EXE file signing ;)
boramalper将近 4 年前
Caddy[0] also uses ZeroSSL[1] alongside Let’s Encrypt.<p>[0] <a href="https:&#x2F;&#x2F;caddyserver.com&#x2F;docs&#x2F;automatic-https#overview" rel="nofollow">https:&#x2F;&#x2F;caddyserver.com&#x2F;docs&#x2F;automatic-https#overview</a><p>[1] <a href="https:&#x2F;&#x2F;zerossl.com&#x2F;" rel="nofollow">https:&#x2F;&#x2F;zerossl.com&#x2F;</a>
评论 #28244555 未加载
评论 #28244755 未加载
评论 #28244838 未加载
lmeyerov将近 4 年前
Do any free TLS LE alternatives handle AWS&#x2F;GCP&#x2F;Azure domains? It&#x27;s been a frustrating usability blocker on tools like Caddy to have a few of the most popular domains singled out, so been curious..
jijji将近 4 年前
I like the use of the shuf command to randomize the list, very nice!
评论 #28248433 未加载
user32556将近 4 年前
Is there any free CA that supports signing on an IP address? e.g. <a href="https:&#x2F;&#x2F;1.1.1.1&#x2F;" rel="nofollow">https:&#x2F;&#x2F;1.1.1.1&#x2F;</a>
评论 #28255978 未加载
评论 #28256624 未加载
jedisct1将近 4 年前
Is there any free CA supporting intermediate&#x2F;sub certificates?<p>This is what I would really be looking for in an alternative to Let&#x27;s Encrypt.
评论 #28254788 未加载
评论 #28248819 未加载
hrez将近 4 年前
ssl.com &quot;First, register for a free account. Next, you need to get your API credentials&quot;<p>yeah, pass
als0将近 4 年前
Great to have more choice in the free certificate market
tommica将近 4 年前
Nice, thanks for the creator for making this!
15155将近 4 年前
Comments like these are always amusing after the latest HN &quot;why you don&#x27;t need Kubernetes&quot; post - setting up cert-manager is a 5 minute affair.