I'm sure most of you are aware of https://letsencrypt.orgalready. How do you all imagine this will change the SSL market and how will other certificate authorities such as GlobalSign, Comodo, etc compete?
While this is a decent point (having a company with an insurance policy to sue), you do realise that any trusted CA can issue a cert for your domain any time they like, right? The only thing stopping them is policy and procedure along with the risk that if they get caught, they could get tossed out of browsers' certificate stores (like DigiNotar and CNNIC). If someone's issuing certs they shouldn't be issuing then those protections have already failed.Nothing against free SSLs, but I feel more comfortable with paying for them. If something happens with an SSL I paid for I have more traction if there were legal or financial repercussions.
IdenTrust isn't bootstrapping the Let's Encrypt CA out of the goodness of their hearts, they're likely hoping to be able to upsell people to other products like wildcards and EV.I doubt that this will have a major effect against GlobalSign/Comodo, etc because they are the big players, no sane SME or company will use a free SSL service and if you need EV SSL, LetsEncrypt won't be able to do it either.
I understand that but my comment still holds true.While this is a decent point (having a company with an insurance policy to sue), you do realise that any trusted CA can issue a cert for your domain any time they like, right? The only thing stopping them is policy and procedure along with the risk that if they get caught, they could get tossed out of browsers' certificate stores (like DigiNotar and CNNIC). If someone's issuing certs they shouldn't be issuing then those protections have already failed.
There are some really untrustworthy organisations who can issue certs that you'll accept, most notably repressive governments.
That has been their policy for a long time. If you're using it for a control panel or for a billing panel, etc, you're going to get denied.I support any CA that offers free domain validated SSL certificates. The more the merrier!
The reason why I think Let's Encrypt is better than StartSSL is that the former seems to not care, at least right now, about the content of the site. Unfortunately StartSSL recently updated their process to not offer free certificates to commercial websites.
That's likely what many of the CA's are hoping on, that people are dumb/etc and will keep paying. LetsEncrypt will get merged into cPanel, likely sooner rather than later. The API is simple for them to integrate since they already have a CSR system in WHM itself.Nothing against free SSLs, but I feel more comfortable with paying for them. If something happens with an SSL I paid for I have more traction if there were legal or financial repercussions.
Right, which is likely why LE is refusing to say much in regards to wildcards until their root certificate gets accepted by Microsoft, etc. Will it? Probably.IdenTrust isn't bootstrapping the Let's Encrypt CA out of the goodness of their hearts, they're likely hoping to be able to upsell people to other products like wildcards and EV.
Not sure if for business let's encrypt is trusted enough. For now I prefer to buy certs from known authorities.
Domain-validation certificates only confirm that the relevant domain is under the control of the site recipient. In theory, this should not validate the identity of the recipient. However, end users less aware of the nuances of certificates may miss the differences, and as a result, these DV certificates can help the hacker gain legitimacy with the public.
While Let’s Encrypt has stated that they do not believe CAs should act as a content filter, they do check domains that it issues against the Google safe browsing API.
Ideally, CAs should be willing to cancel certificates issued to illicit parties that have been abused by various threat actors. However, security on the infrastructure is only possible when all critical players – browsers, CAs, and anti-virus companies – play an active role in weeding out bad actors. A key takeaway from the malvertising incident is that website owners should ensure that they secure their own website control panels, to ensure that new subdomains beyond their control are not created without their knowledge...
EV, PCI, and auditing still being large ticket items for places like Comodo