Stories
Slash Boxes
Comments

SoylentNews is people

posted by cmn32480 on Sunday September 11 2016, @05:48PM   Printer-friendly
from the there's-gotta-be-a-downside-to-this dept.

According to a post on the Google Online Security Blog, beginning in January 2017 Google Chrome will begin flagging all sites that use traditional HTTP rather than HTTPS for passwords or other sensitive information as "insecure". It also indicates that Google plans to eventually start flagging ALL traditional HTTP-only sites as "insecure". While HTTPS has always made sense for truly sensitive information, a pure HTTPS web does have implications for legacy tools - essentially if anyone is not using the absolute latest of one of the "big three" web browsers, they will always potentially be just one security update away from being locked out of the web.


Original Submission

 
This discussion has been archived. No new comments can be posted.
Display Options Threshold/Breakthrough Mark All as Read Mark All as Unread
The Fine Print: The following comments are owned by whoever posted them. We are not responsible for them in any way.
  • (Score: 3, Informative) by TheRaven on Monday September 12 2016, @09:25AM

    by TheRaven (270) on Monday September 12 2016, @09:25AM (#400602) Journal

    scaring away everyone with my self-signed certificate

    Serious question: You've gone to the trouble of generating a certificate and configuring your web server to use it. You've generated a CSR and signed it yourself. That's 95% of the effort in getting a proper certificate, so why would you not go the rest of the way?

    --
    sudo mod me up
    Starting Score:    1  point
    Moderation   +1  
       Informative=1, Total=1
    Extra 'Informative' Modifier   0  
    Karma-Bonus Modifier   +1  

    Total Score:   3  
  • (Score: 0) by Anonymous Coward on Monday September 12 2016, @02:49PM

    by Anonymous Coward on Monday September 12 2016, @02:49PM (#400733)

    Generating a key and a self-signed certificate represents 95% of the effort? You can do that in a single command-line invocation of openssl:

    openssl req -new -x509 -days 365 -key ca.key -out ca.crt

    That leaves the other 5% (one-nineteenth of the total effort) to reach out to a third party to get them to sign your key. I think you're either overestimating the difficulty of creating a self-signed key or underestimating the difficulty of dealing with third parties.

    • (Score: 2) by TheRaven on Monday September 12 2016, @03:17PM

      by TheRaven (270) on Monday September 12 2016, @03:17PM (#400746) Journal

      That's not a self-signed cert, that's an unsigned cert. With an unsigned cert, your web server has access to the only private key in the chain. There's no way that you can revoke, and anyone that compromises your web server can generate new certificates that appear to be you.

      To generate a self-signed cert, you need to generate a signing cert, a CSR from your unsigned cert, sign the CSR with the signing cert, and (typically, depends a bit on the server) merge the two. When you've done this, you keep the private key for the signing cert on a different machine, and then if your web server is compromised you can revoke the cert, yet keep using other certs signed with your trust root and not need to update any client devices that trust that root. Even if you're not doing revocation, you can create certs with a short lifetime and roll them over every couple of months without surprising clients (same signing cert) and reduce the impact of a compromise.

      With StartSSL, the only extra step is that you paste the CSR into a web form instead of passing it to an OpenSSL command line. Actually, if you trust your web browser, you can generate the keypair using the browser's built-in functionality, and then you just need to enter the domain name and copy the cert and key to the correct location, without needing to use the openssl command line at all. With LetsEncrypt, you set up a fairly simple daemon and it will automatically generate and refresh the certs for you.

      Generating the key and cert is not the sum total of the effort involved, you also need to configure the server (or servers, if you're also turning on TLS for email, XMPP, and whatever else you run servers for) to use ssl, tell it where to find the key, and so on. When you include these steps, having a third-party sign the cert is, as I said, a tiny fraction of the total effort.

      --
      sudo mod me up
      • (Score: 2) by Pino P on Monday September 12 2016, @03:43PM

        by Pino P (4721) on Monday September 12 2016, @03:43PM (#400763) Journal

        With StartSSL, the only extra step is that you paste the CSR into a web form instead of passing it to an OpenSSL command line.

        With StartSSL, as with all other CAs that follow the CAB Forum's Baseline Requirements, the machine still needs a valid fully qualified domain name (FQDN). You can't have StartSSL sign a certificate for an RFC 1918 private IP address or for a domain in some made-up TLD such as .local. This means everyone who wants to run a NAS internally on a private home LAN and access the NAS through HTTPS has to buy a domain for that LAN and renew it annually.

        • (Score: 2) by TheRaven on Monday September 12 2016, @03:48PM

          by TheRaven (270) on Monday September 12 2016, @03:48PM (#400767) Journal
          So? If you want to run a device on a private network, without connection to the Internet, then you probably have a far smaller set of client machines to worry about. For this use case, you can be your own CA. Add your own root cert to all of the devices that you care about and sign all of your certs with it. This is totally off topic though, because if you run a device on a private network without connection to the Internet, then it probably won't be listed on Google anyway.
          --
          sudo mod me up
          • (Score: 2) by Pino P on Tuesday September 13 2016, @01:10AM

            by Pino P (4721) on Tuesday September 13 2016, @01:10AM (#401042) Journal

            If you want to run a device on a private network, without connection to the Internet, then you probably have a far smaller set of client machines to worry about.

            But this set would include friends and family visiting my home, who aren't guaranteed to know how to install a trusted root CA on their phone or tablet.

            if you run a device on a private network without connection to the Internet, then it probably won't be listed on Google anyway.

            Clear HTTP will be penalized not only in Google Search but also in Google Chrome, including the copy of Google Chrome on the device of a visiting friend or family member.