The Asocial

Let's Encrypt: public beta

A new Certificate Authority

Article date December 4, 2015
Category internet
Tags security

Yesterday Let’s Encrypt entered public beta, and we have finally got what should have been there from the beginning: a certificate authority that may be tolerable. Although the “authority” part still suggests that it is not a nice thing (see anti-authoritarianism), and X.509 is all messed up, as it was mentioned in our recent Tor article, in some aspects “Let’s Encrypt” is better in comparison to others, and CA authorities in general provide at least some security against non-targeted attacks performed by bigger authorities (governments, that is), or by non-official scam that exploits vulnerabilities introduced by those authorities.

How it was before

Fraud

Until now, CAs mostly resembled mafia (protection racket), apart from being illegal. Or a monopoly held by a conglomerate. They basically take money for performing basic computations, often adding some “warranty”. Let’s just take a look at this shit; for hundreds of USD the following “advantages” are offered:

And they offer free certificates, too! There are claims such as “Ninety day free SSL Certificate (other CAs offer 30 days maximum.)”; not to mention that it is a lie now, it was a lie for a long time before – even crappy StartSSL — which requires an outdated TLSv1, which is normally disabled in modern software — used to issue free certificates for a year. Comodo is just the first relevant non-ad result thrown by DDG for “ssl certificates” (you won’t find commercial offers among the first few dozens of results using proper naming), but they are all pretty much the same.

Ironically, CAs exhibit common fraud signs, while they are supposed to protect you from fraud, among other things. Perhaps that’s why they should be “authorities” in order to survive and be legal at all. And that’s just one of the problems with X.509 PKI.

Self-signed certificates

The problem with self-signed certificates is that most users won’t notice them being forged (unless they have received and installed them manually as “trusted” previously). Some users would mostly see self-signed certificates when attacked by their ISPs: supposedly to enforce censorship without confusing users (and without getting tons of phone calls), those ISPs perform those MitM attacks with self-signed certificates, sometimes with default values – in order to show a message, and possibly to intercept data that is supposed to be transmitted over a secure channel. Others will see it while using malicious, hacked, and/or commercial Wi-Fi networks. Self-signed certificates are still better than no encryption at all, unless you get a false sense of safety after seeing one, but generally it implies scam activities, making self-signed certificates only useful in specific cases.

How it is with LE

First of all, “Let’s Encrypt” is free, and not a trial/marketing kind of free, which makes it usable for hobby projects and non-essential parts of any projects; it is finally easy to take care of security, and not just “green address bar” for “customer conversion”.

To set certificates with it, you just grab the letsencrypt client, possibly check the documentation, install all the dependencies, and generate a key and a certificate with a single command. It is very easy to use, the certificate gets issued instantly, while in most cases the client takes care of verification for you, providing a few options for that. It also allows you to choose things such as key length, can be set on cron, and apparently updates itself. Neat stuff, which may decrease CA-based fraud and increase overall security over internet in the nearest future.

Though it also has a few issues, as seen from the first glance:

Generally, it takes control over your server for no good reason, making you to hack around in order to gain some control over the process, and is quite web-oriented.

X.509 PKI is still messed up, but “Let’s Encrypt” does not seem to be an outright fraud, as other CAs do.