Community
Wiki Posts
Search

O/T: LetsEncrypt

Thread Tools
 
Search this Thread
 
Old Dec 3, 2015 | 12:24 pm
  #1  
Original Poster
FlyerTalk Evangelist
Conversation Starter
All eyes on you!
20 Years on Site
 
Join Date: Nov 2002
Location: ORD
Posts: 14,771
O/T: LetsEncrypt

There are a lot of IT types on here whom I thought would be interested in this (if they don't know about it already). LetsEncrypt is a new certificate authority that allows for web admins to automate the process of issuing and renewing SSL/TLS certificates for their sites. As of today, it's open to the public.

Neat stuff! ANyone using it yet?

edit: forgot to mention that it's entirely free and open-source, and sponsored by many tech titans, including Mozilla, Cisco, and Facebook, as well as the EFF.

Last edited by gfunkdave; Dec 3, 2015 at 12:51 pm
gfunkdave is offline  
Old Dec 3, 2015 | 12:38 pm
  #2  
FlyerTalk Evangelist
40 Countries Visited3M100 Nights20 Years on Site
 
Join Date: Sep 2000
Programs: BA, AA, DL, KLM, UA
Posts: 37,489
Very, very cool.
ScottC is offline  
Old Dec 4, 2015 | 1:25 am
  #3  
FlyerTalk Evangelist
30 Countries Visited
2M
All eyes on you!
25 Years on Site
 
Join Date: Jul 2000
Location: in the vicinity of SFO
Programs: AA 2MM (LT-PLT, PPro for this year)
Posts: 19,784
I was unaware of this, but... sweet.

I guess I will be moving off self-signed certificates real soon now!
nkedel is offline  
Old Dec 4, 2015 | 5:56 am
  #4  
FlyerTalk Evangelist
25 Years on Site
 
Join Date: Feb 1999
Location: Seat 1A, Juice pretty much everywhere, Mucci des Coins Exotiques
Posts: 34,337
I heard about it a couple days ago, but as I don't run a website I don't care personally. However this is good news overall for the Internet because anyone can now build a secure website and not have to worry about paying CA's. It's really good for web designers and ultimately customers from developing nations who can't easily make purchases over the Internet.
stimpy is offline  
Old Dec 4, 2015 | 6:58 am
  #5  
Original Poster
FlyerTalk Evangelist
Conversation Starter
All eyes on you!
20 Years on Site
 
Join Date: Nov 2002
Location: ORD
Posts: 14,771
Update: I used LetsEncrypt yesterday to generate a certificate for the Linux box in my house. It was pretty painless.

LetsEncrypt uses plugins to automate the process. They have ones for Apache and nginx, but the nginx one is still experimental. The Apache one will install the certificate for you and configure Apache to use it. So, I used the "standalone" plugin, in which LetsEncrypt starts its own webserver. The authenticator machine on the internet connects to LEtsEncrypt's server and makes sure that a pre-agreed url on the server returns a certain value. Then it issues the certificates and stores them in /etc/letsencrypt/live.

I manually configured nginx with the resulting certificates and got a green padlock saying my connection was authenticated by Lets Encrypt Certificate Authority X1. Total process took about 20 mins of reading the manual. ONce you know what you are doing, it will take all of 60 seconds to issue/renew certificates. AUtomatic renewal is coming in the nearish future, they say.

Super cool service and very welcome.

As a side note, you can also get a free domain certificate from StartSSL, but their process is the traditional, manual one.
gfunkdave is offline  
Old Dec 4, 2015 | 11:52 am
  #6  
FlyerTalk Evangelist
30 Countries Visited
2M
All eyes on you!
25 Years on Site
 
Join Date: Jul 2000
Location: in the vicinity of SFO
Programs: AA 2MM (LT-PLT, PPro for this year)
Posts: 19,784
Originally Posted by gfunkdave
Update: I used LetsEncrypt yesterday to generate a certificate for the Linux box in my house. It was pretty painless.
Can you use the traditional manual process on LetsEncrypt? Because having done that many times before, it'd be MUCH easier (for me) than futzing with their plugin.
nkedel is offline  
Old Dec 4, 2015 | 11:57 am
  #7  
Original Poster
FlyerTalk Evangelist
Conversation Starter
All eyes on you!
20 Years on Site
 
Join Date: Nov 2002
Location: ORD
Posts: 14,771
Yes, there are a couple options: webroot, in which you point it to your server's web root directory, and the full manual, which requires you to manually do everything.

https://letsencrypt.org/howitworks/

https://letsencrypt.readthedocs.org/...g.html#plugins

If you don't want to let the Apache or nginx plugins do anything with your server config, or if you don't want to stop your web server to let LE's Standalone method work, then I'd suggest going with webroot. It will put the keys and certs on your server in /etc/letsencrypt/live, and you can point your web server to them.

Last edited by gfunkdave; Dec 4, 2015 at 12:03 pm
gfunkdave is offline  
Old Dec 4, 2015 | 12:04 pm
  #8  
All eyes on you!
10 Years on Site
 
Join Date: Oct 2015
Location: next to HAM
Programs: LH M+M
Posts: 974
Originally Posted by nkedel
Can you use the traditional manual process on LetsEncrypt? Because having done that many times before, it'd be MUCH easier (for me) than futzing with their plugin.
Also this https://github.com/diafygi/gethttpsforfree

I am not very fond of auto-mumbo-invasion of security related things.
PAX_fips is offline  
Old Dec 4, 2015 | 12:06 pm
  #9  
Original Poster
FlyerTalk Evangelist
Conversation Starter
All eyes on you!
20 Years on Site
 
Join Date: Nov 2002
Location: ORD
Posts: 14,771
Originally Posted by PAX_fips
Also this https://github.com/diafygi/gethttpsforfree

I am not very fond of auto-mumbo-invasion of security related things.
Interesting - though I'm not sure how this is different from running LE in manual mode. I'd just cut out the middleman and use LE directly.

I don't understand your particular concern on "auto-mumbo-invasion". The LE script needs root access to write to /etc, to write to web server config files if needed, and to bind to a port under 1024. BUt the whole thing is open source, so you can read through it and find out what it's doing. Personally, I trust the EFF and LE more than I would trust, say, Microsoft or Apple.
gfunkdave is offline  
Old Dec 4, 2015 | 12:18 pm
  #10  
All eyes on you!
10 Years on Site
 
Join Date: Oct 2015
Location: next to HAM
Programs: LH M+M
Posts: 974
The automode client updates itself (or tries so) every time it runs - so it would be a constant audit effort.

Just doesnt fit my style..

Edit/Add: the LE client needs a lot of software installed, that I dont see fit for an exposed system like webservers.
PAX_fips is offline  
Old Dec 4, 2015 | 12:36 pm
  #11  
Original Poster
FlyerTalk Evangelist
Conversation Starter
All eyes on you!
20 Years on Site
 
Join Date: Nov 2002
Location: ORD
Posts: 14,771
Originally Posted by PAX_fips
The automode client updates itself (or tries so) every time it runs - so it would be a constant audit effort.

Just doesnt fit my style..

Edit/Add: the LE client needs a lot of software installed, that I dont see fit for an exposed system like webservers.
I hadn't noticed it requiring much aside from Python. But I guess it's all about how paranoid the sysadmin is. For me, I trust the EFF and the backers they have, for their stated purpose. If I were running a Sooper Secret NSA site, I probably would do something else. But I think LE is great for 95% of sites out there.
gfunkdave is offline  
Old Apr 17, 2016 | 11:53 am
  #12  
FlyerTalk Evangelist
All eyes on you!
20 Years on Site
 
Join Date: Jun 2002
Location: n.y.c.
Posts: 14,059
Wow, that was easy (especially compared to others, like StartSSL). Just installed a cert for my Apache server. Other than the 90-day expiration policy, what's the catch?
nerd is offline  
Old Apr 17, 2016 | 5:27 pm
  #13  
Original Poster
FlyerTalk Evangelist
Conversation Starter
All eyes on you!
20 Years on Site
 
Join Date: Nov 2002
Location: ORD
Posts: 14,771
Originally Posted by nerd
Wow, that was easy (especially compared to others, like StartSSL). Just installed a cert for my Apache server. Other than the 90-day expiration policy, what's the catch?
There isn't one.

Just make sure you set an automated task to renew the certificate.
gfunkdave is offline  
Old Apr 18, 2016 | 1:07 am
  #14  
 
Join Date: Jun 2009
Programs: GE
Posts: 247
Originally Posted by nerd
Wow, that was easy (especially compared to others, like StartSSL). Just installed a cert for my Apache server. Other than the 90-day expiration policy, what's the catch?
No catch. The 90 day policy is there for security purposes, to continually force refreshing new certificates. It's also there to force the use of automation; that way there's little continual maintenance required.

Also, they do domain validation only. That's perfectly good for most people. Extended Validation certificates, where the certificate issuer actually verifies your identity (And not just that you control that domain) cost a LOT more money but usually only certain entities need that.

Otherwise these certificates are essentially as good as the ones you'd pay good money for.
bbtrvl is offline  
Old Apr 18, 2016 | 9:38 pm
  #15  
2M
60 Nights
50 Countries Visited
15 Years on Site
 
Join Date: Jul 2007
Location: Brisbane, Australia
Programs: UA 1K/MM, Marriott Titanium, IHG Gold, Hertz PC, Avis PC
Posts: 8,527
Originally Posted by bbtrvl
Otherwise these certificates are essentially as good as the ones you'd pay good money for.
But no better than the ones you've been able to get free from StartSSL.com for years. It just comes down to whether you'd prefer to use LE's software to handle updates (at most) every 90 days, or if you'd prefer to do it yourself once a year.

Personally, I prefer the latter - but each to their own.
docbert is offline  


Contact Us - Archive - Advertising - Cookie Policy - Privacy Statement - Terms of Service -

This site is owned, operated, and maintained by MH Sub I, LLC dba Internet Brands. Copyright © 2026 MH Sub I, LLC dba Internet Brands. All rights reserved. Designated trademarks are the property of their respective owners.