this post was submitted on 16 Dec 2024
356 points (97.8% liked)

Technology

59982 readers
2285 users here now

This is a most excellent place for technology news and articles.


Our Rules


  1. Follow the lemmy.world rules.
  2. Only tech related content.
  3. Be excellent to each another!
  4. Mod approved content bots can post up to 10 articles per day.
  5. Threads asking for personal tech support may be deleted.
  6. Politics threads may be removed.
  7. No memes allowed as posts, OK to post as comments.
  8. Only approved bots from the list below, to ask if your bot can be added please contact us.
  9. Check for duplicates before posting, duplicates may be removed

Approved Bots


founded 2 years ago
MODERATORS
(page 2) 50 comments
sorted by: hot top controversial new old
[–] jdw@links.mayhem.academy 8 points 2 days ago* (last edited 2 days ago) (6 children)

Don’t certs just create an ephemeral key pair that disappears after the session anyhow? What does cert validity period have to do with “This is a big upgrade for the security of the TLS ecosystem because it minimizes exposure time during a key compromise event.”

I mean, it’s LE so I’m sure they know what their talking about. But…?

[–] treadful@lemmy.zip 5 points 2 days ago (2 children)

I'm far from an expert on PKI, but isn't the keypair used for the cert used for key exchange? Then in theory, if that key was compromised, it could allow an adversary to be able to capture and decrypt full sessions.

[–] jdw@links.mayhem.academy 4 points 1 day ago (2 children)

No. Perfect Forward Secrecy (ephemeral keys) prevents this type of replay.

[–] treadful@lemmy.zip 1 points 1 day ago

Time for a dive, thanks.

[–] Blackmist@feddit.uk 1 points 1 day ago

Although this only was added in TLS1.2 I think. I had to switch it on manually for my server.

I think it's default for TLS1.3.

[–] snowfalldreamland@lemmy.ml 5 points 1 day ago

Im also not an expert but i believe since there Is still an ephemeral DH key exchange happening an attacker needs to actively MITM while having the certificate private key to decrypt the session. Passive capturing wont work

[–] frezik@midwest.social 2 points 1 day ago

The key pair you're thinking of is just a singular key for a block cipher. That key needs to be generated/transmitted in a secure manner. Meaning that its security is dependent on the cert. The expiration time of that cert is what they're aiming at.

load more comments (4 replies)
[–] Laser@feddit.org 16 points 2 days ago

It's kind of in line with their plan to get rid of OCSP: short certificate lifetimes keep CRLs short, so I get where they're coming from (I think).

90 days of validity, which was once a short lifetime. Currently, Google is planning to enforce this as the maximum validity duration in their browser, and I'm sure Mozilla will follow, but it wouldn't matter if they didn't because no provider can afford to not support chromium based browsers.

I was expecting that they reduce the maximum situation to e.g. 30 days, but I guess they want to make the stricter rules optional first to make sure there are no issues.

[–] sugar_in_your_tea@sh.itjust.works 14 points 2 days ago (5 children)

Interesting. I use LetsEncrypt largely for internal services, of which I expose a handful externally, and I've been thinking of only opening the external port mapping for cert renewals. With this at 90 days, I was planning on doing this once/month or so, but maybe I'll just go script it and try doing it every 2-3 days (and only leave the external ports open for the duration of the challenge/response).

I'm guessing my use-case is pretty abnormal, but it would be super cool if they had support for this use-case. I basically just want my router to handle static routes and have everything be E2EE even on my LAN. Shortening to 6 days is cool from a security standpoint, but a bit annoying for this use-case.

load more comments (5 replies)
[–] M33@lemmy.sdf.org 12 points 2 days ago (1 children)

Digicert, Sectigo, Globalsign: hold my beer, 1 day certificate, even better: on the fly certificate per client 😂

[–] AAA@feddit.org 5 points 1 day ago (1 children)
[–] M33@lemmy.sdf.org 1 points 1 day ago (1 children)

Free has zero value in the enterprise world if managing certificates is a nightmare. Certificate prices is insignificant when your average website is a 90.000€ project.

load more comments (1 replies)
[–] paraphrand@lemmy.world 9 points 2 days ago (1 children)

I wonder how short this could conceivably go…

[–] Rivalarrival@lemmy.today 27 points 2 days ago (1 children)

Dynamic generation. There is no certificate until user request.

[–] groet@feddit.org 25 points 2 days ago (1 children)

Perfect, let's also bind the certificate to a user session that is derived from a user fingerprint. That way the CA can track users across all sites

[–] stinky@redlemmy.com 11 points 2 days ago

I just want to serve https, not get someone's dick permanently installed in my ass

load more comments
view more: ‹ prev next ›