Let's Encrypt is 10 years old now
Let’s Encrypt is a free certificate authority that simplifies obtaining SSL/TLS certificates through an automated process, supported by major organizations to enhance internet security and privacy for all users.
Read original articleLet’s Encrypt is a free certificate authority established by the Internet Security Research Group (ISRG) to promote widespread use of SSL/TLS encryption on the internet. The initiative addresses the challenges associated with obtaining server certificates, which can be costly, confusing, and cumbersome to manage. By providing a straightforward, one-click process for acquiring certificates, Let’s Encrypt aims to simplify the transition to secure communications for all domain owners. The project is supported by major organizations including Mozilla, Cisco, and the Electronic Frontier Foundation, and is designed to be free, automatic, secure, transparent, open, and cooperative. The goal is to make TLS encryption accessible to everyone, thereby enhancing internet security and privacy. The automated system ensures that certificate issuance and renewal are seamless, allowing users to focus on their services without the burden of manual certificate management. Let’s Encrypt is part of a broader movement to create a more secure and privacy-respecting web.
- Let’s Encrypt provides free SSL/TLS certificates to domain owners.
- The certificate issuance process is automated and user-friendly.
- Major tech organizations support the initiative to enhance internet security.
- The project emphasizes transparency and open standards in its operations.
- Let’s Encrypt aims to make secure communications universally accessible.
Related
More Memory Safety for Let's Encrypt: Deploying ntpd-rs
Let's Encrypt enhances memory safety with ntpd-rs, a secure NTP implementation, part of the Prossimo project. Transitioning to memory-safe alternatives aligns with broader security goals, supported by community and sponsorships.
Letsencrypt Supports Wildcard Certificates
Let's Encrypt offers free SSL/TLS certificates for secure HTTPS connections, relying on donations. They issue Domain Validation and SAN certificates, recommend reporting malicious activities, and emphasize TLS/SSL security.
Intent to End OCSP Service
Let's Encrypt will discontinue OCSP in favor of CRLs to enhance privacy. This change won't affect website visitors but may impact non-browser software. Users relying on OCSP are advised to prepare for the transition.
All I Know About Certificates – Certificate Authority
The article highlights the critical role of certificates in the TLS handshake for website identity verification, emphasizing trusted Certificate Authorities' responsibilities and the impact of free certificates from Let’s Encrypt.
All I Know About Certificates – Certificate Authority
The article highlights the significance of TLS certificates in verifying website identities, preventing impersonation, and maintaining trust through trusted Certificate Authorities, while outlining the verification process and the role of intermediate certificates.
I remember a time when having an HTTPS connection was for "serious" projects only because the cost of the certificate was much higher than the domain. You go commando and if it sticks then you purchase a certificate for a 100 bucks or something.
Today is roughly the ten year anniversary of when we publicly announced our intention to launch Let's Encrypt, but next year is the ten year anniversary of when Let's Encrypt actually issued its first certificate:
https://letsencrypt.org/2015/09/14/our-first-cert/
In December of 2015 (~9 years ago today) is was made available to everyone, no invitation needed:
Can't believe its been ten years.
It's nice that you can now get free TLS certs without having to resort to shady outfits like StartSSL. This allows any website to easily move to HTTPS, which has basically elimated sensitive data (including logins) from being sent over unencrypted connections.
On the otherhand, this reinforces the inherently proken trust model of TLS certificates where any certificate authority (and a lot of them are controlled by outright hostile entities) has the ability to issue certificates for your domain without your involvement. Yes there are tons of kludges to try and mitigate this design flaw (CAA records, certificate transparency) but they don't 100% solve the issue. If not for LE perhaps there would have been more motivation to implement support for a saner trust mechanism by now that limmits certificate issuance to those entities who actually have any authority to decide over domain ownership, like with DNSSEC+DANE.
I'm also concerned with the (intentional) lack of backwards compatibility with moving sites to TLS, which is not just a one time TLS on/off issue but a continual deprecation of protocols and ciphers. This is warranted for things that need to be secure like banking or email but shouldn't really be needed to view a recipe or other similar static and non-critical information. Concerns about network operators inserting ads or other shit are better solved with regulation.
Does anyone remember how we renewed certificates before LE? Yeah, private keys were being sent via email as zip attachments. That was a security charade. And as far as I know, it was a norm among CAs (I remember working with several).
Thank you Let's Encrypt.
So funny that all of their security, vetting and endless verifications are standing on a single passport photo sent over an email to this day.
To explain the issue with HTTPS certificates simply, issuance is automated and rests on the security of DNS, which is achieved via DNSSEC and most do not implement.
Basing it on an open protocol, so it doesn't become a single point of failure, was a clever idea that allows the idea to survive the demise of any single organization.
May there be many more such anniversaries.
But I guess automation and standards had to catch up in order for LE to securely setup their CA.
That said, I’m wondering why there aren’t 10 or so popular alternatives to LE, since that seems to be the landscape for domain registrars, for example.
In 2024, if your PaaS does not have automated encryption for deploys, I will never use it.
Related
More Memory Safety for Let's Encrypt: Deploying ntpd-rs
Let's Encrypt enhances memory safety with ntpd-rs, a secure NTP implementation, part of the Prossimo project. Transitioning to memory-safe alternatives aligns with broader security goals, supported by community and sponsorships.
Letsencrypt Supports Wildcard Certificates
Let's Encrypt offers free SSL/TLS certificates for secure HTTPS connections, relying on donations. They issue Domain Validation and SAN certificates, recommend reporting malicious activities, and emphasize TLS/SSL security.
Intent to End OCSP Service
Let's Encrypt will discontinue OCSP in favor of CRLs to enhance privacy. This change won't affect website visitors but may impact non-browser software. Users relying on OCSP are advised to prepare for the transition.
All I Know About Certificates – Certificate Authority
The article highlights the critical role of certificates in the TLS handshake for website identity verification, emphasizing trusted Certificate Authorities' responsibilities and the impact of free certificates from Let’s Encrypt.
All I Know About Certificates – Certificate Authority
The article highlights the significance of TLS certificates in verifying website identities, preventing impersonation, and maintaining trust through trusted Certificate Authorities, while outlining the verification process and the role of intermediate certificates.