Email or username:

Password:

Forgot your password?
Stefan Eissing

Yesterdays link to the Let‘s Encrypt blog dragged in some people who seem to think that CAs are unnecessary or even evil.

LE is s very small group who set out to improve the terrible CA situation and the fucking middle box corruptions.

They did that successfully with a budget that a medium sized city spends on its department for car license plates.

So, my advice: don‘t yell at people who made the world somewhat better or you‘ll soon run out of ones who try.💁🏻‍♂️

13 comments
Kevin Riggle

@icing just link them “on trusting trust” and block them when they whine

orva

@icing Sometimes it feels like that big chunk of those people are ones that haven't actually experienced times before LE existed, but have somehow learned those attitudes from the generation who have.

n0toose

@icing "don‘t yell at people who made the world somewhat better or you‘ll soon run out of ones who try" is a great quote

Sebastian Lauwers

@icing I used to deploy CAs for a living, including providing consultancy on how to organise the security of root CAs, etc. This could be for banks, telcos, or governments.

When LE came about, my LinkedIn went “Fuuuuuuu”, and sounded as if the commies had won.

Even without the inherent security increase of having so many more websites encrypted, one of LE’s biggest contributions is that it forced people to stop manipulating privkeys manually and copying/emailing them around.

~n

@teotwaki @icing Also... the need for private CAs is still there. (no need to ask me how I know, I guess)
It's just that the grand bazar of gold-plated bits died.

Sebastian Lauwers

@nblr Private CAs are still very clearly needed. I'm just appalled when I see people in charge of private CAs who don't know the first thing about certificates.

I had one argue to me that they couldn't issue a client cert without a domain name! This client cert was intended for an external party, and the CA person was happy to issue it with a cn=$external.DONOTUSE.$clientcompany.com. No way that could be abused.

~n

@teotwaki uuhm. uhm. I mean... technically (as in X.509 words on imaginary paper) you can even issue one without a CN, not sure if there's any implementation who would find that funny, but implying that there's any structure to what's in a CN? That sounds like someone who only ever suffered a single vendor's implementation and idea how to do things. lel. There is an abundance of other details of that spec one might want to argue over, this isn't one of them.

Dan Murphy

@icing that is utterly baffling, do people not remember the bad old days when certs were even more of a pain to deal with and cost just enough that most people understandably didn't bother?

EndlessMason

@DanHatesNumbers
And you had to manually extract the cert and upload it to cpanel up hill both ways in the snow

@icing

deepy

@DanHatesNumbers @icing what about the good old days where you had to yearly send a copy of your passport to Israel and you'd get a certificate in 1-5 business days?

[HUGS] getimiskon :OwOid: :blobcatgooglywtf: :verified_neko:
@icing CAs are a what you could call a "necessary evil", like lots of things in today's society, but i don't consider LE to be bad, compared to what other corporations do. It was an initiative to improve security on the web and it has been successful. Although, to be honest, i would like to see a more decentralized option being adopted instead.
ddg

@icing there are people who complain about LE? It's made my life so much easier I can't fathom someone yelling at them. I guess I just lack imagination…

Fubaroque

@icing Well, the browsers created the problem, that LetsEncrypt is trying to solve… 🥴

… nothing wrong with the encryption provided by a self signed certificate. 🤔

Go Up