←back to thread

155 points kxxt | 1 comments | | HN request time: 0s | source
Show context
gethly ◴[] No.45083427[source]
Because those ephemeral LE certificates are such a great idea...
replies(6): >>45083455 #>>45083516 #>>45083798 #>>45083991 #>>45084464 #>>45088393 #
shaky-carrousel ◴[] No.45083516[source]
It is, if your objective is to closely centralize the web. If you make https mandatory, via scare tactics, only people with certificates will have websites. If you make ephemeral certificates mandatory by taking advantage of a monopoly, then only big SSL providers who can afford it will survive.

Then, when you have only two or three big SSL providers, it's way easier to shut someone off by denying them a certificate, and see their site vanish in mere weeks.

replies(6): >>45083645 #>>45083750 #>>45083879 #>>45084701 #>>45086962 #>>45090198 #
tgsovlerkhgsel ◴[] No.45084701[source]
Meanwhile, in the real world:

- We went from the vast majority of traffic being unencrypted, allowing any passive attacker (from nation state to script kiddie sitting in the coffee shop) to snoop and any active attacker to trivially tamper with it, to all but a vanishing minority of connections being strongly encrypted. The scare tactics used to sell VPNs in YouTube ads used to all be true, and no longer are, due to this.

- We went from TLS certificates being unaffordable to hobbyists to TLS certificates being not only free, but trivial to automatically obtain.

- We went from a CA ecosystem where only commercial alternatives exist to one where the main CA is a nonprofit run by a foundation consisting mostly of strong proponents of Internet freedom.

- Even if you count ZeroSSL and Let's Encrypt as US-controlled, there is at least one free non-US alternative using the same protocol, i.e. suitable as a drop-in replacement (https://www.actalis.com/subscription).

- Plenty of other paid but affordable alternatives exist from countless countries, and the ecosystem seems to be getting better, not worse.

- While many other paths have been used to attempt to censor web sites, I haven't seen the certificate system used for this frequently (I'm sure there are individual court orders somewhere).

- If the US wanted to put its full weight behind getting a site off the Internet, it would have other levers that would be equally or more effective.

- Most Internet freedom advocates recognize that the migration to HTTPS was a really, really good thing.

replies(5): >>45084765 #>>45085429 #>>45086605 #>>45087152 #>>45090142 #
justsomehnguy ◴[] No.45084765[source]
Meanwhile, in the real world:

- We now provide a completely free certs for a malicious web-sites

- Degraded encryption value so much it's not even indicated anymore (remember the green bar for EV?)

- Pavlov-trained everyone to dumb-click through 'this page is not secure' warnings

- SNI exists and even without it anything not on CDN is blocked very easily

replies(4): >>45084914 #>>45084950 #>>45085075 #>>45087109 #
1. kelnos ◴[] No.45087109{3}[source]
> We now provide a completely free certs for a malicious web-sites

Malicious websites never had a problem buying certs before. Sure, the bar is lower now, but I don't think it was a particularly meaningful bar before. Besides, the most common ways to get malicious websites shut down are to get their webhost to cut them off, or get a court order to seize their domain name. Getting their TLS cert revoked isn't common, and doesn't really do the job anyway.

> Degraded encryption value so much it's not even indicated anymore (remember the green bar for EV?)

No, we've degraded the identity verification afforded by EV and those former browser features. Remember that the promise of SSL/TLS was two things: 1) your traffic is private, 2) it verifies that the server you thought you were contacting is actually the one you reached.

I think (2) was always going to be difficult: either you make it hard and expensive to acquire TLS certificates, and (2) has value, or you don't, and it doesn't. I think pervasive encryption is way more important than site owner identity validation. And I don't think the value of an EV cert was even all that high back when browsers called them out in their UI. There are lots of examples of people trivially managing to get an EV cert from somewhere, with their locally-registered "Stripe, LLC" or whatever in the "validated" company name field of their cert.

> Pavlov-trained everyone to dumb-click through 'this page is not secure' warnings

Not sure what that has to do with this. That was more of a problem back when we didn't have Let's Encrypt, so lots of people were using self-signed certs, or let their certs expire and didn't fix it, or whatever. These days I expect certificate warnings are fairly rare, and so users might actually start paying attention to them again.

> SNI exists and even without it anything not on CDN is blocked very easily

ESNI also exists, and while not being available everywhere, it'll get there. But this is a bizarre complaint, as it's entirely trivial to block traffic when there's no TLS at all.