When has it become normal practice to intercept (as in #MitM attack!) connections secured by a #letsencrypt certificate? That's outrageous!

For years and years I didn't have a single such issue with my selfhosted service, but recently I had the "pleasure" - twice! - to deal with such malicious networks. It's beginning to be a huge annoyance. (Some of my services are relevant for my work.)

Do we have to go back to paid certificates??

#selfhosting #cybersecurity #TLS

@hambier I suspect you are connecting through a corporate network. Then the answer is "since always". Corporate networks use proxies and corporate PCs have the "midm" certificate forced on their configuration.
Where I work, it is well described in the terms of use we receive.
@manux The Contern sportshall public wifi likes to disagree ;-)
At work it seems to have been a misconfiguration indeed.