Lukewarm take:

When I see general* "security advice" that mentions "do not use public WiFi" or "use a VPN", I am immediately suspicious about all other advice offered.

Yes, a decade ago that was a consideration, because most sites were not using HTTPS. Credentials were flying cleartext on the wire.

Today, almost all sites use HTTPS. Doesn't mean the risk is zero, but it's way lower.

*) "general" meaning "without a very specific threat model in mind", meant for general public, etc.

#InfoSec

Actually, downgraded that take to "lukewarm", it should really not be controversial at all these days. It's been a hot minute since LetsEncrypt changed the HTTPS landscape!

What is beyond me is that such "security advice" still gets pushed. 

Also, shout-out to @letsencrypt for dramatically changing the security landscape of the Web for the better over the years.

Rarely is there an example of a project so effective and so directly improving everyone's lives, while at the same time keeping the original engineering mindset and just Doing Stuff Right™ humbly in the background.

Next November it will have been exactly a decade since LE started. We all owe them a huge 10th birthday party.

#InfoSec

@rysiek @letsencrypt well. I agree but with https is not all done and secure. The main content is mostly encrypted by https, but dns usually is not. The public wifi provider can't see your password, but can see what websites you are using as dns-over-https is not widely spread yet.
@stepan @letsencrypt yes, it is always the question of how deep you want to go into the rabbit hole. In the end you end up in the On Trusting Trust world and manually etching your own PCBs to make sure they are not hardware-backdoored. 🤷‍♀️

@stepan @rysiek @letsencrypt do you want to offer a random public wifi provider a fraction of your DNS traffic, or an VPN provider all of your DNS traffic? I think the later is worse.

Yes, VPN brings protection, but only if you run the server yourself.

@stepan
But the public WiFi provider cannot anymore inject JavaScript into the sites you're viewing, or change the bank account number you're about to make a transfer to.
And DoH is somewhat problematic, because sure, now the thousands of WiFi providers cannot see DNS queries - but the three DoH providers can.
@rysiek @letsencrypt

@rysiek @letsencrypt For real! Certs used to be so expensive! And often confusing. LE absolutely changed the game.

I might get away from building web software if we ever devolved back to the pre-LE days.

@rysiek @letsencrypt found raising party maybe 🤔😃

@rysiek And other people just say this was Google enforcing TLS security with HTTPS on the web.

There are legitimate applications on the web, that don't need TLS to work, which are perfectly fine for the creative commons, e.g..

And that it's not clear why a web page requested via HTTP should be marked as insecure in the UI, if it will not receive any particularly sensitive information.

That Let's Encrypt was a heist to further enclose the open web.

It was a revelation for some, not all.

@yala @rysiek Some providers started injecting JavaScript into pages served without TLS, sometimes to display ads, sometimes to show warnings about your account.

HTTPS everywhere also killed the annoying and RFC-violating NXDOMAIN capture pages served by some providers.

Letsencrypt and HTTPS everywhere are a good thing that needed to happen to the web.

@neverpanic
Thank you for calmly explaining this further. I need to nod to the fact that the side-effects of the protocol design of HTTP do not only affect the implementations of some enthusiast environment, but the Web at large. There we must address for a quite larger diversity of possible misuse, which is well covered by HTTPS.

@rysiek

@yala And those people are wrong.

@yala @rysiek let me help you here: https://www.troyhunt.com/heres-why-your-static-website-needs-https/

TLDR: Because it's not all about sending sensitive data. Attackers can manipulate your site when served over HTTP. They can inject all kinds of nonsense, from animated gifs to crypto miners to requests to other websites. And these things are done in the real world at ISP levels in various countries.

So while you might don't need the encryption HTTPS provides, you probably want the authentication.

Here's Why Your Static Website Needs HTTPS

It was Jan last year that I suggested HTTPS adoption had passed the "tipping point" [https://www.troyhunt.com/https-adoption-has-reached-the-tipping-point/], that is, it had passed the moment of critical mass [https://en.wikipedia.org/wiki/The_Tipping_Point] and as I said at the time, "will very shortly become the

Troy Hunt

@sheogorath @yala

> They can inject all kinds of nonsense, from animated gifs to crypto miners to requests to other websites.

Not to mention actual malware:
https://citizenlab.ca/2014/08/cat-video-and-the-death-of-clear-text/

Schrodinger's Cat Video and the Death of Clear-Text

"...Web 2.0 was created so that people could publish cute photos of cats." This report provides analysis of products for facilitating targeted surveillance.

The Citizen Lab
@rysiek @letsencrypt @catsalad
They also proved that certificates can "just work" if you're forced to automate them.

@FritzAdalis or if you actually just have a way of doing that. Automating certificate renewal before @letsencrypt was an utter pain in the arse even if you wanted to do it!

@catsalad

@FritzAdalis @rysiek @letsencrypt @catsalad And there is a push from Google to phase out manually managed certificates, by reducing the allowed lifetime to three months.
@waldi @mirabilos @letsencrypt @FritzAdalis @rysiek @catsalad Because you can't meaningfully automate OV certification for it to make any sens. Since LE changed the way we thinking about certificates almost all traffic is authorized using DV, that gives much less security than OV.
@rysiek @letsencrypt All my podcasts are supported by adverts for VPNs and I don't understand what they are supposed to be protecting you from these days.
@bencurthoys @rysiek @letsencrypt
That's easy to answer.
What they are protecting one from is loss of sleep rooted in not understanding one's threat model.
That is a billion $currency industry.
Sadly so.

@bencurthoys @rysiek @letsencrypt current TLS with SNI does not hide which site you visit

https://en.m.wikipedia.org/wiki/Server_Name_Indication

Server Name Indication - Wikipedia

@kramse @bencurthoys @rysiek @letsencrypt VPN just changes which faceless corporation gets to see it
@bencurthoys @rysiek @letsencrypt because poking holes in streaming setvice[s] geofencing is a large market that we (temporarily) have a polite agreement to not put front and centre.
@mce @bencurthoys @rysiek @letsencrypt though recently i had an issue with Hulu rejecting my login and when I called for customer service the first thing they asked was if I was using a VPN. I think they'll be cracking down on VPN
@bencurthoys @rysiek @letsencrypt The podcasts I listen to promoting VPNs are often just talking about how to view Netflix from other countries now.
@rysiek @letsencrypt wholeheartedly second that!
We've cancelled our Digcert contract saving > 100k€.
One of our Apache servers has > 2500 active certs to bump to www. prefix. All fully automated with Apache's mod_md fuzzless. @icing is a giant!
@rysiek @letsencrypt Party good, donations to them better.
@rysiek @letsencrypt
What they got very right is using the appropriate measures for the problem robustly. for >90% of cases knowing "is this host the host that it is claiming it is" is sufficient. everything else follows with elegant inevitability as implemented by LE in a lean, automatable way. That seems to be not a small feat to pull off these days - well, or even 10 years ago. The feature-creep and mismatch of solution and problem is very real for many other cases in the security landscape.
@rysiek @letsencrypt I mean… I‘m very wary of „works for most“ solutions but this is the exception that improves many people’s lives and lowers the bar of implementing previously tedious measures without any negative impact on the rest.
@rysiek @letsencrypt Damn... 10 years already. Time flies!

@rysiek
Without @letsencrypt I would probably not be able to self-host the things I host. I used to do StartSSL (they also offered free certs) but that was a manual process that I would need to complete for a bunch of domains. And then I would probably either decide against self-hosting or against publicly exposing the service or use something unsafe like putting all projects on the same subdomain.

At any rate: this is so much better! Thanks Letsencrypt!

#InfoSec

@rysiek @letsencrypt I wish they'd start offering S/MIME certificates. If we could normalize that, phishing would be much less of a problem.
@mathew @rysiek @letsencrypt IIRC CACert.org does do S/MIME certs, though they're quite a different model, and never got widely included like LE did.

@rysiek @letsencrypt I remember getting a certificate for the first time for one of my sites, $100+ a year. Insignificant for most businesses but it was something for me.

Now can just set up a new domain or subdomain and register a certificate in minutes...

@rysiek @letsencrypt @ariadne Letsencrypt has let me run Mastodon, blogs and even the https://thirring.org main site without all the hassles and expense of buying certificates (when they started, these were hundreds to thousands of dollars per year) Definitely greatful for them!

@rysiek

For another reason, @letsencrypt can be considered pioneers: their service is both free *and* commonly accepted.

One of the most uncomfortable, overlooked consequences of "certified" electronic IDs, timestamps etc is that lawmakers and regulatory bodies have resorted to defining heavy constraints only, leaving implementation to the "market".

The result is that related services are essentially inaccessible when you can't afford to pay for a commercial provider.

@rysiek @letsencrypt I can't express the appreciation I felt recently when I was able to automate certificate generation for our domain via Terraform thanks to LetsEncrypt. It just worked and I was able to have high confidence. Just delightful. All because a group decided to democratize security and abstract it enough that it was accessible for people like me.
@rysiek @letsencrypt amen! I'm so happy they exist and are really helping make things better!

@rysiek the only thing that pisses me off re: #LetsEncrypt is tuat they basically got #VC-#TechBro #FastLane in regards to acceptance whilst #CaCert got #Cockblocked by #GAFAMs all day despite doing actual #DueDiligence re: who gets a #certificate.

But better @letsencrypt than no #SSL, even tho I think #X509 is bad and ibstead we should've #OpenPGP-based #encryptioncfor everything...

@kkarhan perfect is the enemy of the good.

@rysiek I know.

And @letsencrypt is better than no encryption at all.

It just feels kinda shit when one does actual effort akd due diligence and then just gets rolled over by a huge ass firm...

Interesting perspective wrt Let’s Encrypt vs CA Cert. My take was that Let’s Encrypt basically did the minimum that was required by the CA/Browser forum while CA Cert constructed a parallel scheme for verifying OpenPGP certs which is in no way required for CA/Browser forum regulations.

As for OpenPGP/X.509 of course the CA system is suboptimal but it works while OpenPGP is used only in niche environments (let’s put aside the OpenPGP/LibrePGP split that’s going on right now).

@rysiek In Let's Encrypt's un-defence, their usefulness comes from the fact that they're fixing a glaring hole that commercial web-makers of late nineties built into the protocol stack in order to pave the way for a centralised WWW.

@letsencrypt