TE
科技回声
首页24小时热榜最新最佳问答展示工作
GitHubTwitter
首页

科技回声

基于 Next.js 构建的科技新闻平台,提供全球科技新闻和讨论内容。

GitHubTwitter

首页

首页最新最佳问答展示工作

资源链接

HackerNews API原版 HackerNewsNext.js

© 2025 科技回声. 版权所有。

Stop Paying For SSL Certificates You Don't Need

21 点作者 bensedat将近 12 年前

8 条评论

xenophonf将近 12 年前
OK, I&#x27;ll bite. This article offers _terrible_ advice, especially if the reader is a neophyte who thinks they are a hacker:<p>* barely mentions operational security<p>* nothing about potential costs or risks<p>* no scoping of the CA certificate<p>* bad recommendations for key lengths<p>* only an off-hand mention of CRL publication<p>* no mention of intermediate CAs<p>If it was just some guy saying, &quot;hey, here&#x27;s how you set up your own toy CA without having to read the crappy OpenSSL manual pages, but don&#x27;t use it for anything real because it isn&#x27;t safe from anything other than the most trivial attacks,&quot; then I wouldn&#x27;t even bother to down-vote the thing. Instead, it&#x27;s some guy saying, &quot;hey, use your toy CA for real stuff&quot; without the attendant cost-benefit analysis that includes scenarios like &quot;my toy CA got hacked and issued certificates that caused one of my customers to get hacked, and now my customer is suing me for negligence.&quot;<p>Not only is this person wrong, but their advice will make the Internet less secure. I&#x27;m no fan of X.509 PKI (that Mozilla ticket about Honest Achmed really tickles my funny bone and not in any of the ways that make me laugh), but I&#x27;m not about to second-guess the kinds of heavy-duty security engineering that goes into running a real, live root CA.<p>&lt;&#x2F;rant&gt;
chrislaco将近 12 年前
If you&#x27;re going to roll your own CA to secure your infrastructure, get in the habit of also creating your own intermediate authority, esp if you&#x27;re going to do some minimal client certificates. Then you can keep your root ca offsite and never used. IF your stuff get&#x27;s compromised, then it&#x27;s a matter of revoking all of your intermediates certs rather than starting over with a completely new CA.
评论 #6029131 未加载
评论 #6029096 未加载
mankyd将近 12 年前
This sentence is not anywhere near close enough to the top:<p>&quot;This CA isn&#x27;t going to be trusted by your website visitors, but your infrastructure can trust it as long as you keep it safe. &quot;<p>In other words, this doesn&#x27;t mean you can buy a single cert and then go around creating new certs for your other domains and subdomains. You&#x27;re still going to need to pay for those.
chrislaco将近 12 年前
Good article, if for no other reason than the internet is littered with &quot;self signed certificates are bad&quot;, which is true for most scenerios except for those pointed out in this article.
pwf将近 12 年前
The only reason I&#x27;ve personally bought an SSL certificate was to make the payments page of my website PCI compliant. Pretty sure this doesn&#x27;t get me around that.<p>More people do need to know this kind of stuff though; I&#x27;m using it at work to great effect.
cdjk将近 12 年前
I&#x27;m waiting for the widespread adoption of DNSSEC so we can just start adding TLSA records with the public key fingerprint. Yes, it means you have to trust whoever has access to create DNS records, but you already have to trust them.
otterley将近 12 年前
It seems like a false economy to bother with the hassle of setting up your own CA, whose certificates will raise alerts in most browsers, considering that you can get an SSL certificate for $9 from cheapssls.com.
asdahjnkdasrgk将近 12 年前
Or join cacert.org and use the web of trust.