Let's Encrypt is 10 years old today ! (letsencrypt.org)
from pcouy@lemmy.pierre-couy.fr to technology@lemmy.world on 18 Nov 19:11
https://lemmy.pierre-couy.fr/post/805239

Happy birthday to Let’s Encrypt !

Huge thanks to everyone involved in making HTTPS available to everyone for free !

#technology

threaded - newest

0x01@lemmy.ml on 18 Nov 19:36 next collapse

Man I love let’s encrypt, remember how terrible ssl was before the project landed?

pcouy@lemmy.pierre-couy.fr on 18 Nov 19:41 next collapse

I did not have the money to pay the insane amounts these greedy for-profit certificate authorities asked, so I only remember the pain of trying to setup my self-signed root certificate on my several devices/browsers, and then being unable to recover my private key because I went over the top with securing it.

rikudou@lemmings.world on 18 Nov 20:05 next collapse

Crazy times. Nowadays it’s weird when a website doesn’t have https. Back then it was pretty much big companies only. And the price of a wildcard certificate…

brbposting@sh.itjust.works on 18 Nov 23:26 collapse

Except for neverssl.com

Triggering the launch of captive portals for public Wi-Fi users everywhere yayy

Ghoelian@lemmy.dbzer0.com on 19 Nov 13:15 collapse

That website says it will never use SSL, but it definitely just connected over https with a valid certificate when I went there.

foggenbooty@lemmy.world on 19 Nov 14:07 collapse

That’s odd. Try httpforever.com instead.

Ghoelian@lemmy.dbzer0.com on 19 Nov 14:30 collapse

Nice yeah that site actively rejects https connections.

teuto@lemmy.teuto.icu on 19 Nov 18:48 collapse

I just use an IP address, they always resolve http and I can type 1.1.1.1 faster.

leisesprecher@feddit.org on 18 Nov 20:24 next collapse

And if you remember, that this whole shebang was only started, because Snowden revealed that the NSA spied on all of us, it’s getting much much darker.

rottingleaf@lemmy.world on 19 Nov 12:18 collapse

People behave as if having a green lock icon were enough to consider you’re safe.

People behave as if there were not multiple cases of abuse of PKI.

People behave as if all those whistleblowing cases exposing widespread illegal activities by the state were not treated as normal, except those exposing them being chased and vilified.

What I’m trying to say is that we’re past the stage where techno-optimism about the Internet made sense. They just say in the news that abusing you is good, and everybody just takes it.

treadful@lemmy.zip on 18 Nov 23:34 next collapse

Remember they wanted like $75 for certs? The gall.

missphant@lemmy.blahaj.zone on 19 Nov 00:10 next collapse

I always had to fill out multiple pages of forms to get those free 1 year “trial” certs from startssl.

xthexder@l.sw0.com on 19 Nov 01:31 collapse

Oh man, I forgot about startssl until just now. I definitely had a few of those certs. If you wanted something fancy like a wildcard cert back then, you were paying $$$

lud@lemm.ee on 19 Nov 08:15 collapse

Luckily, wildcard certs are insecure and should be avoided.

xthexder@l.sw0.com on 19 Nov 18:10 collapse

Wildcard certs are perfectly fine. Your own instance lemm.ee is using one right now.

Obviously there could be issues if subdomains are shared with other sites, but if the whole domain is owned by 1 person, what does it matter?

lud@lemm.ee on 19 Nov 19:15 collapse

If one system is somehow compromised, the attacker could effectively impersonate all the systems on your entire domain if they had the wildcard cert. Maybe it’s not a huge deal for individuals but for companies or other organisations it could be extremely dangerous.

If someone wanted a wildcard cert at work I would be very cautious before I even considered issuing one. Unfortunately there are a few wildcard certs on our domain, but those are from before my time.

pcouy@lemmy.pierre-couy.fr on 20 Nov 05:43 collapse

Having a certificate for any subdomain has implications for other sibling domains, even without a wildcard certificate.

By default, web browsers are a lot less strict about Same Origin Policy for sibling domains, which enables a lot of web-based attacks (like CSRF and cookie stealing) if your able to hijack any subdomain

rottingleaf@lemmy.world on 19 Nov 12:15 next collapse

When you have to use it, then yes. But in general standard technologies of today are mostly rigged.

dan@upvote.au on 20 Nov 06:46 collapse

I remember the days when each site that wanted to use SSL had to have a dedicated IP.

somenonewho@feddit.org on 18 Nov 20:41 next collapse

Damn! That’s definitely a “I’m old” moment for me. I still remember when I first heard about the concept and I remember setting it up the first time on a self hosted project (which seemed harder back then).

Awesome project!

RoyaltyInTraining@lemmy.world on 18 Nov 21:35 next collapse

Let’s Encrypt is amazing, but are there any equally trustworthy alternatives people could switch to if something bad happens to it?

Laser@feddit.org on 18 Nov 21:50 next collapse

Maybe ZeroSSL

Redjard@lemmy.dbzer0.com on 19 Nov 06:39 collapse

They don’t offer wildcard certs, but otherwise I think they are.
I wanna say acme.sh defaults to them.

Laser@feddit.org on 19 Nov 07:07 collapse

Never used them, but they state at zerossl.com/features/acme/ that their free acme certs include wildcards.

Redjard@lemmy.dbzer0.com on 19 Nov 15:38 collapse

Yes, seems you are right. Not sure where I got the impression.

Unrelated, when I researched this I saw that acme.sh, zerossl, and a bunch of other acme clients are owned by the same entity, “Stack Holdings”/“apilayer.com”. According to this, zerossl also has some limitations over letsencrypt in account requirements and limits on free certificates.

By using ZeroSSL’s ACME feature, you will be able to generate an unlimited amount of 90-day SSL certificates at no charge, also supporting multi-domain certificates and wildcards. Each certificate you create will be stored in your ZeroSSL account.

It is suspicious that they impose so many restrictions then waive most on the acme api, where they presumably could not compete otherwise. On their gui they allow only 3 certificates and don’t allow multi-domain at all. Then even in the acme client they somehow push an account into the process.

[…] for using our ACME service you have to create and use EAB (External Account Binding) credentials within your ZeroSSL dashboard.

EAB credentials are limited to a maximum per user/per day. [This might be for creating them, not uses per credential, unsure how to interpret this.]

This all does make me slightly worry this block around apilayer.com will fall before letsencrypt does.

Other than letsencrypt and zerossl, this page also lists no other full equivalents for what letsencrypt does.

Laser@feddit.org on 19 Nov 15:43 collapse

I think if LetsEncrypt went away, so would ZeroSSL’s free offer.

However, I do think not having limitations on the API is good; automation is good practice and I guess this is a concession to customers /users who have no automation in place (though this is a sad state by now). LE doesn’t offer anything comparable AFAIK.

fmstrat@lemmy.nowsci.com on 18 Nov 22:29 next collapse

If it begins to enshitify, someone will quickly take up the helm. It’s become so core now that someone like Cloudflare would just be like “We do this now.”

CosmicTurtle0@lemmy.dbzer0.com on 18 Nov 23:16 next collapse

Cloudflare sort of provides this now by being a MITM to secure your site between your server and the end user. But this requires you and your end user to trust Cloudflare.

And fwiw the ACME protocol is open so anyone can implement it. I believe even the ACME software that EFF sends out allows you to choose your server with some configuration.

fmstrat@lemmy.nowsci.com on 19 Nov 12:18 next collapse

Yup, it does. I think I still have my server hard coded from when it first launched.

horse_tranquilizers@sh.itjust.works on 19 Nov 16:07 collapse

Cloudfare means no click from me (TBH after I clicked)

dan@upvote.au on 20 Nov 06:52 collapse

I think Cloudflare enshittifying is a bigger risk that Let’s Encrypt.

treadful@lemmy.zip on 18 Nov 23:41 next collapse

They came up with the ACME protocol, so presumably somebody could. The real barrier to entry is the cost of getting into that certificate chain of trust. I have no idea why it’s so difficult and expensive.

xthexder@l.sw0.com on 19 Nov 01:34 collapse

Well, it’s difficult, as it should be, because if you control a certificate in the active chain of trust of browsers, you can hack pretty much anything you want.

treadful@lemmy.zip on 19 Nov 01:56 collapse

Correct me if I’m wrong, but isn’t the CA only signing your public key to prove identity/authority? I don’t think the CA can magically MITM every cert they sign.

The impact is not serious enough to warrant a $1m entry fee, IMO. At best, someone could impersonate a site. They’d also have to get other things in line (e.g. DNS hijacking) to be at all successful anyway. And it’s not like most people are authenticating certs themselves. They just trust browsers to trust CAs that vouch for you and prevents those scary browser warnings.

It doesn’t improve encryption compared to a self-signed cert though.

xthexder@l.sw0.com on 19 Nov 02:39 collapse

If you are the CA, you can sign a new certificate yourself for google.com and the browser will accept it. It’s effectively allows MITM for any certificate. Worse, it’s not even limited to certificates under that CA. The browser has no way of knowing there’s 2 “valid” certs at once, and in fact that is allowed regardless (multiple servers with different instances of the SSL cert is a possibility).

Certificate pinning might save things, since that will force the same certificate as was previously used, but I’m not sure this is a common default.

dan@upvote.au on 20 Nov 06:51 collapse

ZeroSSL, plus a few paid companies support ACME (I know Sectigo and GoDaddy do). Sure, the latter are paid services, but in theory you can switch to them and use the exact same setup you’re currently using with Let’s Encrypt, just with some config changes.

pressanykeynow@lemmy.world on 18 Nov 23:14 next collapse

And it changed the Internet, for good and a lot.

laxe@lemmy.world on 19 Nov 01:38 next collapse

Huge impact on a tiny budget - that’s extremely impressive. The world could be so much better without rent seeking parasites.

noxy@yiffit.net on 19 Nov 01:50 next collapse

Underrated. Stuff rocks.

__matthew__@lemmy.world on 19 Nov 02:02 next collapse

Lol I instinctively freaked out when I saw the post preview assuming it was going to be a post about a major data breach or exploit of some sort relating to Let’s Encrypt.

I probably need more positivity in my life 😂

specialseaweed@sh.itjust.works on 19 Nov 02:32 next collapse

SSL Certs were so god awful before certbot that it’s hard to explain now that it’s so easy and free.

whome@discuss.tchncs.de on 19 Nov 07:10 collapse

Also fucking expensive

nek0d3r@lemmy.world on 19 Nov 04:53 next collapse

And my parents still buy SSL certs because that’s just what they know 🤢

FMEEE@lemmy.dbzer0.com on 19 Nov 05:56 next collapse

Today it’s just more or less stupid to buy SSL you can get one extremely easy for free from Let’s Encrypt or Google Trust…

NikkiDimes@lemmy.world on 19 Nov 07:13 next collapse

Yeah, I uh…I think that’s kinda what this whole conversation here is about

nek0d3r@lemmy.world on 19 Nov 08:27 collapse

I’ve tried explaining to them before, but they think that it’s a scam because it’s free lol

bfg9k@lemmy.world on 19 Nov 19:13 collapse

My last cert renewal was $20 for 3 years. That’s less than a dollar a month, not exactly breaking the bank.

nek0d3r@lemmy.world on 19 Nov 20:41 collapse

It’s been a bit since I’ve asked them, but they certainly complained about the cost before. Almost as much as the hosting itself for sure.

zerozaku@lemmy.world on 19 Nov 05:46 next collapse

Can anyone fill me on this? Why is it so significant?

EngineerGaming@feddit.nl on 19 Nov 06:52 next collapse

It is the free, easy way to get an SSL cert (plus automated renewals). Without it, maybe HTTPS wouldn’t have been so omnipresent.

rottingleaf@lemmy.world on 19 Nov 12:13 collapse

And it shouldn’t have been, SSL PKI is an intentionally rigged architecture. It’s intended for nation-states to be able to abuse it.

I’d like much more some kind of overlay encryption over HTTP based on web of trust and what not. Like those distributed imageboards people were trying to make with steganography in emotion.

It’s a trap. Everybody is already in it and it has already been activated, so - the discussion would be of historical interest only.

NikkiDimes@lemmy.world on 19 Nov 07:14 collapse

HTTPS certs used to be very expensive and technically complicated, making it out of reach for most smaller orgs. Let’s Encrypt brought easy mass adoption and changed encryption availability on the web for everyone.

dan@upvote.au on 20 Nov 06:47 collapse

They also made it a open protocol (the ACME protocol), so now there’s a bunch of certificate providers that implement the same protocol and thus can work with the same client apps (Certbot, acme.sh, etc). I know Sectigo and GoDaddy support ACME at least. So even if you don’t use Let’s Encrypt, you can still benefit from their work.

kaotic@lemmy.world on 19 Nov 08:08 next collapse

A client of mine pays for an SSL cert he doesn’t even use. I’ve told him before I moved him to Let’s Encrypt because I was able to automate the renew process. He decided he needed to continue paying for the SSL cert. I told him we are not using it, but he doesn’t believe me. So he continues to pay for it.

pagenotfound@lemmy.world on 19 Nov 13:03 next collapse

I love it when companies are too stubborn to update their costs despite the necessity changing over the years.

My previous employment kept buying microsoft office license keys despite us already moving to 365. They probably did it out of habit when buying new computers. Needless to say I have a cardstack of license keys at home lol. Granted it’s for Office 2013 but I don’t really need the latest version for basic document processing.

AbsoluteChicagoDog@lemm.ee on 19 Nov 15:58 collapse

Private sector is more efficient my ass

dan@upvote.au on 20 Nov 06:45 collapse

TLS certificates have huge margins, so web hosts love selling them.

JohnyRocket@discuss.tchncs.de on 19 Nov 08:16 next collapse

It doesn’t say on the website but on their anniversary day they are giving away unlimited ssl certs!

jagged_circle@feddit.nl on 19 Nov 14:04 collapse

Well, they do rate limit

jagged_circle@feddit.nl on 19 Nov 14:06 next collapse

Lots of people shitting on stories of people who buy certs.

You do still have to buy a cert if you want one for a .onion. Let’s encrypt still doesn’t support it :(

valkyre09@lemmy.world on 19 Nov 18:27 next collapse

I’m also having to manually cert every 3 months for my emby instance. It’s a minor inconvenience, but I’m definitely tempted to just buy a yearly.

jagged_circle@feddit.nl on 19 Nov 19:05 next collapse

Emby?

valkyre09@lemmy.world on 20 Nov 06:36 collapse

Same idea as Jellyfin / Plex. Self hosted media server. Plex handles ssl certs for you, Emby doesn’t have an automatic process so I’m having to manually replace it every 90 days

jagged_circle@feddit.nl on 20 Nov 14:12 next collapse

Might be less effort for you to submit a PR

numanair@lemmy.ml on 20 Nov 14:37 collapse

Why not use a reverse proxy with this built in? Caddy, Traeffik…

dan@upvote.au on 20 Nov 06:45 collapse

Why not script it so you don’t have to do it manually?

valkyre09@lemmy.world on 20 Nov 06:48 collapse

Your advice is sound, my ability to focus on such a task however… lol

InnerScientist@lemmy.world on 20 Nov 20:51 collapse

But…an onion address doesn’t need a cert?

jagged_circle@feddit.nl on 20 Nov 23:51 collapse

Some apps refuse to work if you dont have TLS, so it depends what you’re running

jagged_circle@feddit.nl on 19 Nov 14:07 next collapse

I’m sad to say that all my sites where http only until 10 years ago

JackbyDev@programming.dev on 19 Nov 14:20 collapse

Well, you usually had to pay extra back then!

crusa187@lemmy.ml on 18 Nov 21:10 next collapse

Yay for their glorious, free trusted ssl certs. Love this project!

jj4211@lemmy.world on 19 Nov 16:12 next collapse

Just two months ago, a security team member dinged one of our services for using Lets Encrypt, as “it’s not as secure as a traditional CA”.

bfg9k@lemmy.world on 19 Nov 19:11 next collapse

I’d love for them to explain how, if anything the short cert validity and constant re-checking of the domain seems more secure than traditional CAs

dan@upvote.au on 20 Nov 06:44 collapse

I’d also argue that the fact that it’s 100% automated and their software is open source makes it objectively more secure. On the issuing side, there’s no room for human error, social engineering, etc.

EnderMB@lemmy.world on 19 Nov 20:01 collapse

It’s sad that these arguments are still being shared. It was the same arguments years ago from people that would just assume that a free cert was inherently unsafe.

digdilem@lemmy.ml on 19 Nov 06:39 next collapse

Sleeping too well lately? Consider this:

If LetsEncrypt were to suffer a few weeks outage, how much of the internet would break?

piccolo@sh.itjust.works on 19 Nov 19:01 next collapse

If you have a fully automated setup. Youll have 30 days to mitigate the fallout.

digdilem@lemmy.ml on 20 Nov 06:35 collapse

It won’t be that simple.

For starters, you’re assuming t-zero response. It’ll likely be a week before people worry enough that LE isn’t returning before they act. Then they have to find someone else for, possibly, the hundreds or thousands of certs they are responsible for. Set up processes with them. Hope that this new provide is able to cope with the massive, MASSIVE surge in demand without falling over themselves.

And that’s assuming your company knows all its certs. That they haven’t changed staff and lost knowledge, or outsourced IT (in which case they provider is likely staggering under the weight of all their clients demanding instant attention) and all that goes with that. Automation is actually bad in this situation because people tend to forget how stuff was done until it breaks. It’s very likely that many certs will simply expire because they were forgotten about and the first thing some companies knows is when customers start complaining.

LetsEncrypt is genuinely brilliant, but we’ve all added a massive single point of failure into our systems by adopting it.

(Yeah, I’ve written a few disaster plans in my time. Why do you ask?)

Zangoose@lemmy.world on 20 Nov 14:27 collapse

Piggybacking off this comment because I completely agree with it.

Did we not learn anything from CrowdStrike? If a comparatively simple fix was able to wipe out half the world, how would something that requires an active choice (where to get certs from) not completely cripple all of our infrastructure?

dan@upvote.au on 20 Nov 06:53 collapse

Shouldn’t be too difficult to swap it out for ZeroSSL. You’d need to remember to update CAA records though.

max55@lemm.ee on 19 Nov 19:39 next collapse

That’s very great news! Thank you for all the good work!

fiendishplan@lemmy.world on 20 Nov 01:16 collapse

I worked for a company we had 300 websites, the boss wanted to buy certs. I told him about Lets Encrypt. He loved the idea it saved us a bunch of money. I suggest we donate $100 to them. Hes says “NO F-ing way!”.