Stories
Slash Boxes
Comments

SoylentNews is people

SoylentNews is powered by your submissions, so send in your scoop. Only 17 submissions in the queue.
posted by martyb on Thursday March 05 2020, @05:54PM   Printer-friendly

Arthur T Knackerbracket has found the following story:

Let’s Encrypt said it will give users of its Transport Layer Security (TLS) certificates more time to replace 1 million certificates that are still active and potentially affected by a Certificate Authority Authorization (CAA) bug before it revokes them.

The popular free certificate authority had given users until Wednesday, March 4, 9:00 p.m. EST to replace 3 million certificates because the bug in its Boulder software—discovered and patched this past Sunday–impacted the way its software checked domain ownership before issuing certificates. However, users grumbled that this was not enough time to correct the problem.

Users and major integrators of Let’s Encrypt managed to replace more than 1.7 million of the affected certificates by the original deadline; however, more than 1 million were left that would have been revoked, causing the company to rethink its plan, a Let’s Encrypt spokeswoman told Threatpost late Wednesday.

“Rather than potentially break so many sites and cause concern for their visitors, we have determined that it is in the best interest of the health of the Internet for us to not revoke those certificates by the deadline,” Josh Aas, executive director for Let’s Encrypt said in a blog post updating users of the situation Wednesday.

The company’s plan now is to revoke 1,706,505 certificates that the company is confident were already replaced as well as “445 certificates that we treated as highest priority for revocation because, at the time we found the bug, they had CAA records that forbid issuance by Let’s Encrypt,” Aas wrote in the post.

“We plan to revoke more certificates as we become confident that doing so will not be needlessly disruptive to Web users,” he wrote.

Disclaimer: SoylentNews uses Let's Encrypt certificates.

Previously:
HTTPS for All: Let's Encrypt Reaches One Billion Certificates Issued [Updated]
Let's Encrypt: An Automated Certificate Authority to Encrypt the Entire Web


Original Submission

 
This discussion has been archived. No new comments can be posted.
Display Options Threshold/Breakthrough Mark All as Read Mark All as Unread
The Fine Print: The following comments are owned by whoever posted them. We are not responsible for them in any way.
  • (Score: 0, Offtopic) by fustakrakich on Thursday March 05 2020, @07:45PM (4 children)

    by fustakrakich (6150) on Thursday March 05 2020, @07:45PM (#967059) Journal

    You're making an unsupportable and, frankly, inane argument

    Yeah, I guess you're right [informationisbeautiful.net]

    --
    La politica e i criminali sono la stessa cosa..
    Starting Score:    1  point
    Moderation   -1  
       Offtopic=1, Total=1
    Extra 'Offtopic' Modifier   0  

    Total Score:   0  
  • (Score: 0) by Anonymous Coward on Thursday March 05 2020, @08:05PM

    by Anonymous Coward on Thursday March 05 2020, @08:05PM (#967070)

    That sites are insecure isn't a question addressed by TFS or TFA.

    What's more, if you connect a device directly to the Internet, you need to assume that, as some point, it will be hacked.

    However, your link and the information within it has nothing to do with the value of HTTPS or Let's Encrypt.

    As such, you're talking out of your ass (again) and it smells that way too.

    I guess our spammy cohort was right:

    [Sung to the tune of Frosty the Snowman [youtube.com]. With apologies to Jack Rollins and Steve Nelson]

    Fusty the moron is a dickless piece of shit
    With an ass that talked and a mouth stuffed with Trump cock
    And the political ideas of a child

    Fusty the moron is a Internet shill, they say He was made of dog shit but the soylentils know
    How he came to troll one day
    There must have been some Trump jizz in That old cock he sucks
    For when he placed it in his mouth He began to talk out of his ass

    Oh, Fusty the moron
    Was a dickhead through and through
    And the soylentils say he could blather fact-free crap
    Just the same as khallow and ari

    Fusty the moron is a dickless piece of shit
    With an ass that talked and a mouth stuffed with Trump cock
    And the political ideas of a child

    Fusty the moron is a Internet shill, they say He was made of dog shit but the soylentils know
    How he came to troll one day
    There must have been some Trump jizz in That old cock he sucks
    For when he placed it in his mouth He began to talk out of his ass

    Fusty the moron
    Knew less and less each day
    So he said, "let's troll
    And I'll be a dickhead
    Now before I'm completely ignored"

    Fusty the moron
    We wish he was on his way
    But he shitposted more and said
    "I won't go away until I prove I'm brain-damaged"

  • (Score: 3, Interesting) by NotSanguine on Thursday March 05 2020, @08:23PM (2 children)

    Please, do explain how encrypting data across the internet is worse than *not* encrypting data across the internet. This ought to be mildly amusing.

    --
    No, no, you're not thinking; you're just being logical. --Niels Bohr
    • (Score: 2, Informative) by fustakrakich on Thursday March 05 2020, @08:42PM (1 child)

      by fustakrakich (6150) on Thursday March 05 2020, @08:42PM (#967084) Journal

      The real simple fatal flaw is trust...

      --
      La politica e i criminali sono la stessa cosa..
      • (Score: 3, Informative) by insanumingenium on Thursday March 05 2020, @09:59PM

        by insanumingenium (4824) on Thursday March 05 2020, @09:59PM (#967120) Journal

        The day you, or anyone else writes up a distributed trust model for the web that doesn't have obvious issues, and which my grandmother could realistically use, I will be on that bandwagon. Seriously, I would beat the hell out of that drum.

        Until then I will use the best tools I have available, which is HTTPS/TLS. Suggesting it is useless or simply scrapping it entirely is BONKERS. I get it, centralized trust isn't a perfect model, but it isn't one chosen out of simple ignorance or malice. Yes, the implementation has room to improve, as it has been improving, and will continue to improve. Your thoughts on fixing what is broken would be appreciated, come back when you have some of those.