ML
    • Recent
    • Categories
    • Tags
    • Popular
    • Users
    • Groups
    • Register
    • Login

    Why Let’s Encrypt is a really, really, really bad idea…

    IT Discussion
    13
    51
    4.5k
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • DashrenderD
      Dashrender @Obsolesce
      last edited by

      @Obsolesce said in Why Let’s Encrypt is a really, really, really bad idea…:

      @Dashrender said in Why Let’s Encrypt is a really, really, really bad idea…:

      Sure - that assumes the browser can reach the CRL... if it's unavilable (which supposedly is a huge problem), most if not all browsers fail to allow access by default.

      If the crl cannot be reached, the cert is not trusted and basically the same thing.

      No, that's definitely not true. as I said - most, if not all browsers - fail open in the case where they can't reach the crl.

      https://scotthelme.co.uk/certificate-revocation-google-chrome/
      76739344-c5d6-4f5e-b952-8374139c093c-image.png

      ObsolesceO 1 Reply Last reply Reply Quote 0
      • ObsolesceO
        Obsolesce @Dashrender
        last edited by

        @Dashrender said in Why Let’s Encrypt is a really, really, really bad idea…:

        @Obsolesce said in Why Let’s Encrypt is a really, really, really bad idea…:

        @Dashrender said in Why Let’s Encrypt is a really, really, really bad idea…:

        Sure - that assumes the browser can reach the CRL... if it's unavilable (which supposedly is a huge problem), most if not all browsers fail to allow access by default.

        If the crl cannot be reached, the cert is not trusted and basically the same thing.

        No, that's definitely not true. as I said - most, if not all browsers - fail open in the case where they can't reach the crl.

        https://scotthelme.co.uk/certificate-revocation-google-chrome/
        76739344-c5d6-4f5e-b952-8374139c093c-image.png

        Chrome will instead rely on its automatic update mechanism to maintain a list of certificates that have been revoked for security reasons. Langley called on certificate authorities to provide a list of revoked certificates that Google bots can automatically fetch. The time frame for the Chrome changes to go into effect are "on the order of months," a Google spokesman said.

        Same thing but different. Google Chrome will be Google Chrome.

        1 Reply Last reply Reply Quote 0
        • stacksofplatesS
          stacksofplates @Emad R
          last edited by stacksofplates

          @Emad-R said in Why Let’s Encrypt is a really, really, really bad idea…:

          @stacksofplates said in Why Let’s Encrypt is a really, really, really bad idea…:

          @Emad-R said in Why Let’s Encrypt is a really, really, really bad idea…:

          @Curtis said in Why Let’s Encrypt is a really, really, really bad idea…:

          https://medium.com/swlh/why-lets-encrypt-is-a-really-really-really-bad-idea-d69308887801

          This guy...

          Actually he makes sense to me, if you have website that is generating good revenue you should spend on SSL

          Yeah I don't agree with that. The "warranties" that you get are literally useless and it's not possible to automate them. There is literally no upside to paying for one, even EV certs.

          Let's not forget that the TLS certs are not for ensuring it is a safe site. It's just a way to have an encrypted channel.

          What about being Unique, or unlike the rest, wont that increase security. Like changing a port of SSH, the same method your not using a service that all the rest are using like Lets Encrypt, Thus by theory more secure.

          No that won't increase security. The security here is that the data is encrypted. Even self signed certs are secure from the fact that they encrypt the data. People conflate the encryption with the validation that the site is owned by who they think it should be owned by. The only purpose of the cert is to show the data is encrypted and there is no one between you and the other end.

          Another issue with non LE certs are the lifetime. If someone gets access to your key, there's at least a year until the new key is created. LE can be as new as you want automatically.

          1 Reply Last reply Reply Quote 2
          • stacksofplatesS
            stacksofplates
            last edited by stacksofplates

            So I finally read this trash. How is this goon a CISSP? The CA doesn't have access to the private key on your server. That's not how CAs work. So if someone "steals the CAs key" they can't just MITM your traffic with an existing key. It's amazing that this was even published....

            ObsolesceO 1 Reply Last reply Reply Quote 1
            • ObsolesceO
              Obsolesce @stacksofplates
              last edited by

              @stacksofplates said in Why Let’s Encrypt is a really, really, really bad idea…:

              So I finally read this trash. How is this goon a CISSP? The CA doesn't have access to the private key on your server. That's not how CAs work. So if someone "steals the CAs key" they can't just MITM your traffic with an existing key. It's amazing that this was even published....

              Regardless of the context,
              If someone steals the CAs key, they can impersonate the CA. Then at that point... well I'm sure you know what's next.

              travisdh1T stacksofplatesS 2 Replies Last reply Reply Quote 0
              • travisdh1T
                travisdh1 @Obsolesce
                last edited by

                @Obsolesce said in Why Let’s Encrypt is a really, really, really bad idea…:

                @stacksofplates said in Why Let’s Encrypt is a really, really, really bad idea…:

                So I finally read this trash. How is this goon a CISSP? The CA doesn't have access to the private key on your server. That's not how CAs work. So if someone "steals the CAs key" they can't just MITM your traffic with an existing key. It's amazing that this was even published....

                Regardless of the context,
                If someone steals the CAs key, they can impersonate the CA. Then at that point... well I'm sure you know what's next.

                I'd argue that LetsEncrypt does a better job of protecting against this sort of thing. Their certs being valid for only 3 months could limit the amount of time nefarious types have to be bad. The paid certs have 2-3 years, and the revocation system is notoriously broken.

                scottalanmillerS 1 Reply Last reply Reply Quote 0
                • scottalanmillerS
                  scottalanmiller @travisdh1
                  last edited by

                  @travisdh1 said in Why Let’s Encrypt is a really, really, really bad idea…:

                  @Obsolesce said in Why Let’s Encrypt is a really, really, really bad idea…:

                  @stacksofplates said in Why Let’s Encrypt is a really, really, really bad idea…:

                  So I finally read this trash. How is this goon a CISSP? The CA doesn't have access to the private key on your server. That's not how CAs work. So if someone "steals the CAs key" they can't just MITM your traffic with an existing key. It's amazing that this was even published....

                  Regardless of the context,
                  If someone steals the CAs key, they can impersonate the CA. Then at that point... well I'm sure you know what's next.

                  I'd argue that LetsEncrypt does a better job of protecting against this sort of thing. Their certs being valid for only 3 months could limit the amount of time nefarious types have to be bad. The paid certs have 2-3 years, and the revocation system is notoriously broken.

                  And I truest the EFF 1000x more than most CAs.

                  JaredBuschJ 1 Reply Last reply Reply Quote 3
                  • JaredBuschJ
                    JaredBusch @scottalanmiller
                    last edited by JaredBusch

                    @scottalanmiller said in Why Let’s Encrypt is a really, really, really bad idea…:

                    @travisdh1 said in Why Let’s Encrypt is a really, really, really bad idea…:

                    @Obsolesce said in Why Let’s Encrypt is a really, really, really bad idea…:

                    @stacksofplates said in Why Let’s Encrypt is a really, really, really bad idea…:

                    So I finally read this trash. How is this goon a CISSP? The CA doesn't have access to the private key on your server. That's not how CAs work. So if someone "steals the CAs key" they can't just MITM your traffic with an existing key. It's amazing that this was even published....

                    Regardless of the context,
                    If someone steals the CAs key, they can impersonate the CA. Then at that point... well I'm sure you know what's next.

                    I'd argue that LetsEncrypt does a better job of protecting against this sort of thing. Their certs being valid for only 3 months could limit the amount of time nefarious types have to be bad. The paid certs have 2-3 years, and the revocation system is notoriously broken.

                    And I truest the EFF 1000x more than most CAs.

                    It is not the EFF. The EFF is one of a few major supporters of the organization the runs LE.

                    1 Reply Last reply Reply Quote 0
                    • wirestyle22W
                      wirestyle22
                      last edited by wirestyle22

                      I'd think the other CA's would want to create a lot of negative propaganda about let's encrypt. Seems like this is possibly the start of that

                      1 Reply Last reply Reply Quote 2
                      • stacksofplatesS
                        stacksofplates @Obsolesce
                        last edited by

                        @Obsolesce said in Why Let’s Encrypt is a really, really, really bad idea…:

                        @stacksofplates said in Why Let’s Encrypt is a really, really, really bad idea…:

                        So I finally read this trash. How is this goon a CISSP? The CA doesn't have access to the private key on your server. That's not how CAs work. So if someone "steals the CAs key" they can't just MITM your traffic with an existing key. It's amazing that this was even published....

                        Regardless of the context,
                        If someone steals the CAs key, they can impersonate the CA. Then at that point... well I'm sure you know what's next.

                        Right but that doesn't give you access to existing keys. Only newly generated keys. You can't just a steal someone's traffic because you got the CA key. And there are a ton of other security measures in place for that scenario.

                        ObsolesceO 1 Reply Last reply Reply Quote 0
                        • ObsolesceO
                          Obsolesce @stacksofplates
                          last edited by

                          @stacksofplates said in Why Let’s Encrypt is a really, really, really bad idea…:

                          @Obsolesce said in Why Let’s Encrypt is a really, really, really bad idea…:

                          @stacksofplates said in Why Let’s Encrypt is a really, really, really bad idea…:

                          So I finally read this trash. How is this goon a CISSP? The CA doesn't have access to the private key on your server. That's not how CAs work. So if someone "steals the CAs key" they can't just MITM your traffic with an existing key. It's amazing that this was even published....

                          Regardless of the context,
                          If someone steals the CAs key, they can impersonate the CA. Then at that point... well I'm sure you know what's next.

                          Right but that doesn't give you access to existing keys. Only newly generated keys. You can't just a steal someone's traffic because you got the CA key. And there are a ton of other security measures in place for that scenario.

                          Right, existing certs are fine. But then you have to question which are from the real CA and which are from the impersonating CA. The impersonating CA would hand out certs with known keys so mitm attacks can occur.

                          stacksofplatesS 1 Reply Last reply Reply Quote 0
                          • stacksofplatesS
                            stacksofplates @Obsolesce
                            last edited by

                            @Obsolesce said in Why Let’s Encrypt is a really, really, really bad idea…:

                            @stacksofplates said in Why Let’s Encrypt is a really, really, really bad idea…:

                            @Obsolesce said in Why Let’s Encrypt is a really, really, really bad idea…:

                            @stacksofplates said in Why Let’s Encrypt is a really, really, really bad idea…:

                            So I finally read this trash. How is this goon a CISSP? The CA doesn't have access to the private key on your server. That's not how CAs work. So if someone "steals the CAs key" they can't just MITM your traffic with an existing key. It's amazing that this was even published....

                            Regardless of the context,
                            If someone steals the CAs key, they can impersonate the CA. Then at that point... well I'm sure you know what's next.

                            Right but that doesn't give you access to existing keys. Only newly generated keys. You can't just a steal someone's traffic because you got the CA key. And there are a ton of other security measures in place for that scenario.

                            Right, existing certs are fine. But then you have to question which are from the real CA and which are from the impersonating CA. The impersonating CA would hand out certs with known keys so mitm attacks can occur.

                            I wasn't arguing that, and he never made that argument. It was solely about it being free and the hackers can get your data now.

                            It's not like LE isn't monitoring their FIPS140-3 HSM with the non-exportable keys stored on it. And in the event someone somehow got in, they can immediately revoke and renew and everyone will get the new key on the next check in. Vs manual certs where you would have to log in to every server and remove the certs manually and add the new ones.

                            ObsolesceO 1 Reply Last reply Reply Quote 3
                            • ingmarkoecherI
                              ingmarkoecher @stacksofplates
                              last edited by

                              @stacksofplates Yes, but it's also about preventing imposters - so you know that who you're talking to is who they claim they are.

                              stacksofplatesS scottalanmillerS 2 Replies Last reply Reply Quote 0
                              • ingmarkoecherI
                                ingmarkoecher
                                last edited by

                                IMHO the whole certificate business is a racket - basically a money making machine. I can't think of any other business from the top of my head that just generates a few kilobytes and gets a ton of money for it. Yes, there is some validation going on - but that's pretty easy to do.

                                I suppose the guy has a point in that Let's Encrypt becomes a single point of failure since it generates so many certificates, not sure if that's a good reason not to use them.

                                scottalanmillerS 1 Reply Last reply Reply Quote 1
                                • ObsolesceO
                                  Obsolesce @stacksofplates
                                  last edited by

                                  @stacksofplates said in Why Let’s Encrypt is a really, really, really bad idea…:

                                  It was solely about it being free and the hackers can get your data now.

                                  To get the data, they would have to break the encryption. That won't happen in the short time period the existing cert is valid for and is renewed. And like you said, if the CA is compromised, it's a simple fix to revoke and issue a new CA cert, and all it was responsible for.

                                  There's really nothing more to it, I don't know why all this. That it's free has nothing to do with it's security. The number of certs issued don't matter either, they don't all come from the same issuing CA (do they?)... If so goes back to the point above anyways

                                  1 Reply Last reply Reply Quote 0
                                  • stacksofplatesS
                                    stacksofplates @ingmarkoecher
                                    last edited by stacksofplates

                                    @ingmarkoecher said in Why Let’s Encrypt is a really, really, really bad idea…:

                                    @stacksofplates Yes, but it's also about preventing imposters - so you know that who you're talking to is who they claim they are.

                                    That's not what the certs are for. If I buy www.ebays.co and make my site look exactly like ebay, the cert doesn't have a responsibility to ensure I'm at the real ebay site. The only thing the cert is for is to ensure my data is encrypted between my end and the remote end and that someone can't intercept it. That's the cert's only purpose.

                                    1 Reply Last reply Reply Quote 1
                                    • scottalanmillerS
                                      scottalanmiller @ingmarkoecher
                                      last edited by

                                      @ingmarkoecher said in Why Let’s Encrypt is a really, really, really bad idea…:

                                      IMHO the whole certificate business is a racket - basically a money making machine. I can't think of any other business from the top of my head that just generates a few kilobytes and gets a ton of money for it. Yes, there is some validation going on - but that's pretty easy to do.

                                      I suppose the guy has a point in that Let's Encrypt becomes a single point of failure since it generates so many certificates, not sure if that's a good reason not to use them.

                                      Right, LE breaks the "racket", as does CloudFlare. The "racketeers" push (and likely pay) for people to spread FUD as their entire business model is based on no one catching on.

                                      1 Reply Last reply Reply Quote 1
                                      • scottalanmillerS
                                        scottalanmiller @ingmarkoecher
                                        last edited by

                                        @ingmarkoecher said in Why Let’s Encrypt is a really, really, really bad idea…:

                                        @stacksofplates Yes, but it's also about preventing imposters - so you know that who you're talking to is who they claim they are.

                                        This is true.... only so far as preventing a man in the middle attack. It doesn't tell you that you selected the right person in the first place, which is how people will read that.

                                        ObsolesceO 1 Reply Last reply Reply Quote 0
                                        • ObsolesceO
                                          Obsolesce @scottalanmiller
                                          last edited by Obsolesce

                                          @scottalanmiller said in Why Let’s Encrypt is a really, really, really bad idea…:

                                          @ingmarkoecher said in Why Let’s Encrypt is a really, really, really bad idea…:

                                          @stacksofplates Yes, but it's also about preventing imposters - so you know that who you're talking to is who they claim they are.

                                          This is true.... only so far as preventing a man in the middle attack. It doesn't tell you that you selected the right person in the first place, which is how people will read that.

                                          Not really. I can create a cert that says I'm bill.gates@microsoft.com or an ssl cert for my server that says facebook.com. A browser may not trust it by default because it comes from my own CA, but that's besides the point.

                                          scottalanmillerS 1 Reply Last reply Reply Quote 0
                                          • scottalanmillerS
                                            scottalanmiller @Obsolesce
                                            last edited by

                                            @Obsolesce said in Why Let’s Encrypt is a really, really, really bad idea…:

                                            @scottalanmiller said in Why Let’s Encrypt is a really, really, really bad idea…:

                                            @ingmarkoecher said in Why Let’s Encrypt is a really, really, really bad idea…:

                                            @stacksofplates Yes, but it's also about preventing imposters - so you know that who you're talking to is who they claim they are.

                                            This is true.... only so far as preventing a man in the middle attack. It doesn't tell you that you selected the right person in the first place, which is how people will read that.

                                            Not really. I can create a cert that says I'm bill.gates@microsoft.com or an ssl cert for my server that says facebook.com. A browser may not trust it by default because it comes from my own CA, but that's besides the point.

                                            No one is discussing your own CA though. The CA mechanism is based on trusted roots.

                                            ObsolesceO 1 Reply Last reply Reply Quote 0
                                            • 1
                                            • 2
                                            • 3
                                            • 2 / 3
                                            • First post
                                              Last post