• JaddedFauceet@lemmy.world
    link
    fedilink
    English
    arrow-up
    27
    ·
    12 days ago

    What is the use case or benefit for the server admin?

    as a server admin I wouldn’t want to keep renewing my cert.

    can anyone help to explain?

    • frezik@midwest.social
      link
      fedilink
      English
      arrow-up
      39
      ·
      12 days ago

      Lets Encrypt certs tend to be renewed by a cronjob, anyway. The advantage is that if someone gets your cert without your knowledge, they have, at most, six days to make use of it.

      • Blackmist@feddit.uk
        link
        fedilink
        English
        arrow-up
        24
        ·
        11 days ago

        If they get it without your knowledge, what are the odds they can get the new one too?

        If they got it with your knowledge, can’t you just revoke the old one?

        • lud@lemm.ee
          link
          fedilink
          English
          arrow-up
          11
          ·
          11 days ago

          If they got it with your knowledge, can’t you just revoke the old one?

          Yeah, but unfortunately cert revocation isn’t that great in practice. Lots of devices and services don’t even check the revocation lists on every connection.

          • ADTJ@feddit.uk
            link
            fedilink
            English
            arrow-up
            1
            ·
            11 days ago

            It would be six days at max, assuming they managed to steal the certificate immediately after it was issued, otherwise it’s gonna be even less.

            Having the certificate doesn’t automatically mean you can change the site, if you have control of the site hosting you likely wouldn’t need to steal the cert anyway.

            Stealing the certificate would allow you to run a man in the middle type attack but that’s inevitably going to be very limited in scope. The shorter time limit on the cert reduces that scope even further, which is great.

            Since most Let’s Encrypt certs will have an automated renewal process this doesn’t even really change the overhead of setup so I think this move makes a lot of sense.

            There are other things certificates can be used for as well of course but I’m just going off your example.

      • Phoenixz@lemmy.ca
        link
        fedilink
        English
        arrow-up
        4
        arrow-down
        7
        ·
        11 days ago

        That makes little sense. If they can get my certificate then I have different problems that ,a 6 day turnaround isn’t going to solve

          • Phoenixz@lemmy.ca
            link
            fedilink
            English
            arrow-up
            4
            arrow-down
            3
            ·
            11 days ago

            … Seriously?

            If someone got a hold of your certificate that is the security equivalent of the entire company being on fire. If they got my certs they likely will have my credit cards, my birth certificate, and my youngest daughter.

            Thank God though that I can renew my certificates every 6 days, that will definitely help sole the problem.

            • frezik@midwest.social
              link
              fedilink
              English
              arrow-up
              4
              arrow-down
              1
              ·
              11 days ago

              OK. Whatever hypothetical we want to think about here, we still want our cert to be renewed.

              • Phoenixz@lemmy.ca
                link
                fedilink
                English
                arrow-up
                2
                ·
                7 days ago

                Yeah and that is something everyone already is doing anyway, I never said anything about not doing that.

                I said that lowering the amount of days to 6 won’t do anything to increase security. Then why not lowering it to 1 day? That ought to be super secure now! Why not 1 hour or 1 minute? Super duper secure?

                What is the actual added security benefit here? Because so far all I’ve seen is security theatre, something unexpected from let’sencrypt

            • frazorth@feddit.uk
              link
              fedilink
              English
              arrow-up
              2
              ·
              11 days ago

              Thats an interesting position.

              I dont keep my credit card information on the load balancer that holds my certs.

              • Phoenixz@lemmy.ca
                link
                fedilink
                English
                arrow-up
                1
                ·
                7 days ago

                Missing bthe point that of they got access to that, they likely have access to a lot more and that you likely have bigger problems than just your SSL certs

              • Hawk@lemmynsfw.com
                link
                fedilink
                English
                arrow-up
                3
                ·
                11 days ago

                I think the implication is the infiltrator would have a lot of access already.

              • Phoenixz@lemmy.ca
                link
                fedilink
                English
                arrow-up
                1
                ·
                7 days ago

                Indeed not, it’s how real life works, as there is more to lige than just SSL. If someone has access to your SSL certificates you have a ginormous set of issues, your easily replaceable SSL certificates being one of the lowest priority. I don’t see how a 6 day limit on that is going to do anything at all to help you with safety

            • Hawk@lemmynsfw.com
              link
              fedilink
              English
              arrow-up
              1
              ·
              11 days ago

              Yeah but it’s just an extra layer. Why not, it’s automated and almost no-cost.