Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!

 



Forgot your password?
typodupeerror
×
Encryption Communications Electronic Frontier Foundation Mozilla Security The Internet

'Let's Encrypt' Project Strives To Make Encryption Simple 116

jones_supa writes: As part of an effort to make encryption a standard component of every application, the Linux Foundation has launched the Let's Encrypt project (announcement) and stated its intention to provide access to a free certificate management service. Jim Zemlin, executive director for the Linux Foundation, says the goal for the project is nothing less than universal adoption of encryption to disrupt a multi-billion dollar hacker economy. While there may never be such a thing as perfect security, Zemlin says it's just too easy to steal data that is not encrypted. In its current form, encryption is difficult to implement and a lot of cost and overhead is associated with managing encryption keys. Zemlin claims the Let's Encrypt project will reduce the effort it takes to encrypt data in an application down to two simple commands. The project is being hosted by the Linux Foundation, but the actual project is being managed by the Internet Security Research Group. This work is sponsored by Akamai, Cisco, EFF, Mozilla, IdenTrust, and Automattic, which all are Linux Foundation patrons. Visit Let's Encrypt official website to get involved.
This discussion has been archived. No new comments can be posted.

'Let's Encrypt' Project Strives To Make Encryption Simple

Comments Filter:
  • Warning!!! (Score:5, Funny)

    by bazmail ( 764941 ) on Friday April 10, 2015 @10:02AM (#49446501)
    Having conversations that your government can't eavesdrop on is tantamount to terrorism.

    You have been warned.
    • Re: Warning!!! (Score:2, Insightful)

      by Anonymous Coward

      This. A thousand times over. You may not like it, I sure as hell don't like it, but we live in the Surveillance Age now and will probably be for the rest of our lives. While it may appear noble and idealistic to want to oppose it, it's also foolish if not downright suicidal. One can't fight the State, especially not when the vast majority of the populace supports it. It's best to choose one's battle and to know when you're beaten. We're beaten. Privacy is dead. It's not coming back. Move on.

      • by Anonymous Coward

        So in other words just roll over and accept it........ And which branch of of which government do you work for?.

        You might be beaten, others are not......

      • Re: Warning!!! (Score:5, Insightful)

        by clonehappy ( 655530 ) on Friday April 10, 2015 @10:34AM (#49446711)

        Cowards like you have never changed the world. Sad, really. Not that I think I'm going to, or anything, but for fuck's sake man stop being a pussy! If we're so beaten, and privacy's so dead, then what the fuck have we to lose by figthing for what's right?

        I'd rather be suicidal and on the right side of history than get to live a meek, shallow little existence cowering in my hole waiting to die, afraid to say the wrong thing or think the wrong ideas. Sure, someone may eventually kill me or persecute me because I believe in freedom and liberty and privacy, but they won't be taking away my dignity. I've done nothing wrong, and I have the right to think and say what I want (as do you). I, for one, will be exercising those rights until I'm six feet under.

        Being cowards and letting everyone roll over on us is how we got in this mess in the first place. It's not too late to take ownership of your historical defeatism and try to affect change.

        • Re: (Score:2, Insightful)

          "on the right side of history" This phrase has always confused me. Unless you are a prophet or time traveler, how do you know you are on the "right side" of history until a significant enough time has passed? And what does "right side" even mean? Is this about winners and losers? Was Stalin on the right side of history since he was a winner (in a manner of speaking) while Hitler was on the wrong side of history since he was a loser? Or is this some kind of moral/ethical rightness? But how do we know what wi
          • I'm not sure why I'm responding to you, as it's obvious to me that you're being disingenuous. Doing the "right thing" is obvious to most people. If you have no moral or ethical compass, then I'm sure this one's hard for you.

            But anyone who was taught right from wrong knows that wholesale monitoring of the private communications of citizens in a free country is a bad thing. It can only lead to abuses and tyrannical actions by those doing the spying. Opposing something that foments tyranny is being on the

            • Doing the "right thing" is obvious to most people.

              Hmm, that sounds suspiciously like that old Judeo-Christian tradition to me. Or do you really think that, say, Buddhism holds to exactly the same standards of right/wrong as Christianity? Or Islam? Or Confucianism? Or Taoism?

              Hint: right/wrong is pretty much defined by what you were taught as a child as proper behaviour. And different people were taught different things, depending on when/where they were raised....

              • by rthille ( 8526 )

                No, the "right thing" is what evolution comes up with as the heuristic for what's best for genes in the long run.
                And that's why it varies from species to species, and environment to environment.

            • by Altrag ( 195300 )

              The trouble is that the "right thing" on a large enough scale is often only defined retrospectively by those who retain power. How different would the world be if the USSR had won the cold war?

              Its easy to say "Communism is bad" when you're just parroting what you've been told for the past 50 years.. Its a lot harder to say it objectively because the only communist countries we've really known have had to operate under the yolk of the US anti-communist rampage.

              Hell, morally speaking, the greed-based capital

            • So "right side" refers to ethics/morals. But what about the history part? By definition history is in the past. So how do you know that what you think in the present is moral will be considered moral by historians of the future? That is what I mean by wishful thinking. Someone who uses this phrases is basically saying "I think that this action is moral/ethical and I hope that future historians agree with me so that when the future history books are written they will show that I was on the right side of hist
          • Re: Warning!!! (Score:4, Interesting)

            by bill_mcgonigle ( 4333 ) * on Friday April 10, 2015 @12:00PM (#49447481) Homepage Journal

            "on the right side of history" This phrase has always confused me. Unless you are a prophet or time traveler, how do you know you are on the "right side" of history until a significant enough time has passed?

            Look at long-term trends.

            Two thousand years ago personal freedom was rare and people were the per se property of their Sovereign. Warring was common, dueling was how arguments were settled, and people drowned their extra babies. Human life had fairly little social value and everything was controlled by the whims of the Gods, regardless.

            In the more advanced civilizations today, people can do pretty much whatever they want in terms of personal liberty, and there's a bunch of obfuscation to disguise the fact that they're still owned by their Sovereign (because they wouldn't accept it consciously). Cooperation is markedly increased, resulting in the march of technology.

            The safe bet is for the trend-lines to continue towards more tolerance, more personal freedom, more blessings of enhanced communications and technology, and a sunset of the nation-state as the pervasive governing mechanism.

            There's no guarantee, but the trends are very strong with only slight perturbations, so to bet against it is a fools' errand. To bet on more authoritarianism, more mercantilism, and more central planning while betting against more peace, more tolerance, and more liberty is a great way to be considered a fool, in history books written far enough into the future (there are always short-term gains for such sociopathic behaviors, so don't expect the history books written tomorrow to judge yesterday's tyrant harshly).

            Historians in 3015 may judge this post harshly, but I wouldn't bet on it.

            • by Anonymous Coward

              Historians in 3015 may judge this post harshly, but I wouldn't bet on it.

              I agree, the odds of historians in 3015 even FINDING this post are slim to none.

          • I take "the right side of history" to mean the side that promoted right over wrong, as considered at some later date.

            This does assume that right and wrong exist, and that we can tell the difference between them. 100 years ago, there would have been a small minority of people on the right side of history vis-a-vi gay rights, but it would still have been the right side of history.

            • But how would you know that? What if gay rights had never progressed? You would have most likely would have believe at this time that people's beliefs 100 years ago were right (since they match what you currently believe is right) and therefor they were on the right side of history. This smacks of confirmation bias.
              • You realize that you just made me google confirmation bias on a Friday night? I'm sorry, don't see your point.

                I wasn't saying that I was wise enough to know who is on the right side of history, just that there is a right side on every issue, and what is right doesn't change regardless of how many people agree with it at any given time

                • How do you know what is right? 100 years ago people would have said that they were on the right side of history when they excluded gays. Now we look back and say that they were mistaken. But perhaps in 100 years our descendents will look back at us and say that we were mistaken to think that we were on the right side of history. We like to think that we are on the right side of history, just as our ancestors did. But we might be just as mistaken as they were. So claiming that we are on the right side of his
        • then what the fuck have we to lose by figthing for what's right?

          Comfort and complacency? If you set the value of freedom to zero, there are still other benefits to be enjoyed. Perhaps you've heard of "bread and circuses"? (this isn't a new problem).

          I'd rather be suicidal and on the right side of history than get to live a meek, shallow little existence cowering in my hole waiting to die

          Realize that you're in a small minority. And in a democracy, the majority gets to enforce their view on you that your f

        • and did you exchange a walk on part in the war for a lead role in a cage....
      • Re: Warning!!! (Score:5, Insightful)

        by pla ( 258480 ) on Friday April 10, 2015 @10:38AM (#49446763) Journal
        we live in the Surveillance Age now and will probably be for the rest of our lives.

        Probably true - But I'll still use encryption for my private files and communications. I'll still refrain from screaming what I had for breakfast into the ether. I'll still make up random information when registering for any service that doesn't need real info to perform its core function. I'll still "fuzz" personal details when relevant to discussions on sites such as Slashdot. I'll still bait telemarketers even though they probably know more about me than I do. And, I'll still make Officer Twitchy get a warrant to search my phone, even if it means I get shot in the back trying to peacefully walk away.

        Accepting the reality of something doesn't mean you should just give up - We all unavoidably die, why don't we all just commit suicide now and save ourselves the hassle of wasting all that time working and sleeping and exercising-so-we-can-live-longer and such? Sometimes, "accepting" something means "fight harder anyway".
        • Amen to this. The proper response to, "If you don't have anything to hide, what are you worried about?" is "I'm worried about what will happen if I don't hide *everything*," followed up with, "Unless you've got a good reason to be looking, mind your own damn business."

          I absolutely support the idea behind this project. I support encryption everywhere, for everyone. I don't want to live in a world where the only people who are worried about encryption are drug dealers, child porn collectors, international

        • by skegg ( 666571 )

          Nicely written.

          I must say I agree with everything you wrote ... except the whole "getting shot in the back". My approach would be to remain in the officer's presence, but to essentially remain mute (or indicate a disinclination to answer) -- surely he can't shoot you for not speaking??? -- until / unless I have my own legal representation.

          In Australia, I believe (IANAL) that we are legally required to give our name, address and D.O.B to police if apprehended. That's it. Only a judge can compel one to speak;

      • One can't fight the State, especially not when the vast majority of the populace supports it.

        We're not fighting the State by using encryption. We're protecting out data from unauthorized access. Like good digital citizens.

    • by lq_x_pl ( 822011 )
      This is one reason why Steganography is so powerful. A heavily-encrypted communication stream just screams "HEY LOOK! I'M NOT LETTING YOU PEEK AT MY STUFF." Information protected in plain sight (hidden in something innocuous), does much less screaming.
      • Re:Warning!!! (Score:5, Insightful)

        by Anonymous Coward on Friday April 10, 2015 @10:46AM (#49446823)

        Yes but if everybody has access to simple to use encryption that stigma goes away, when encrypted traffic is the norm rather than the exception then Its use is not a red flag. Mass adoption is in itself protection.

    • by qbast ( 1265706 )
      Don't worry, all the founders of 'lets encrypt' are entities based in USA, so you can bet private keys of each issued certificate will be delivered to appropriate authorities.
      • I am particularly uncomfortable with the presence of Cisco in this party.

        • by bazmail ( 764941 )
          lol. Thats exactly what I thought when I saw the logos on the right hand side.

          Cisco: hey guys whatcha doin. listening to music huh? Yeah I love me some hippedy-hop music.

      • by Altrag ( 195300 )

        Well I didn't read the details of how they're planning to set this up, but it seems to me that if they have any access to the private keys at all, then they're doing it wrong.

        The private keys must be generated and held privately to be secure (I think that might have something to do with the name..)

        The public key is the only part that should ever be known by or transmitted to a second party (never mind a third party or a MITM.)

  • RTEM (Score:5, Funny)

    by Defenestrar ( 1773808 ) on Friday April 10, 2015 @10:28AM (#49446673)
    Encrypt everything! Bummer about the decryption man pages...
  • I can see that one unintended consequence might be an increase in using encryption to obfuscate applications for commercial / anticompetitive reasons, as well as illegal reasons.

    • there's nothing prohibiting that now.

    • by nine-times ( 778537 ) <nine.times@gmail.com> on Friday April 10, 2015 @10:42AM (#49446783) Homepage

      That's already happening. DRM, for example, has always been partially for commercial reasons (preventing privacy), and largely for anti-competitive reasons (preventing interoperability and forcing people to repurchase the same content repeatedly).

      Encryption is being used for almost every purpose except the good ones. We could use encryption to protect privacy and prevent identity theft, but I guess we can't do that because it might prevent the NSA from snooping on your dick pics.

  • by WaffleMonster ( 969671 ) on Friday April 10, 2015 @10:35AM (#49446729)

    Certs don't work, never have. Aggregating so much power and responsibility into the hands of CAs is just as foolish as key escrows run by governments and organized crime. Something will always go wrong there will always be too much incentive locked up in ensuring that it does. The more successful and useful a "simple" solution for everyone becomes the more incentive exists to coopt it.

    The answer is not doubling down on these things and "encrypting" just because you can or just because its easy.

    Most systems worth securing already require you to provide a password to login. If you want to improve the status quo and really make a difference then get browser vendors to natively support secure logins via TLS-SRP and relegate free certs to the margins for service discovery and account setup where there is no other practical means of establishing trust.

    • I agree with the trust issue on certs however encrypting doesn't mean that I have to use a trust based model if it's for personal uses or for close proximity use, such as within a family or business environment. The issues are much larger in terms of protecting data whether it's stored or in transit across insecure networks. As a start I'd like to see the CA system revamped or replaced with multiple trust authorities, not just one chain and have meaningful teeth to eliminate trust associations with author

      • I agree with the trust issue on certs however encrypting doesn't mean that I have to use a trust based model if it's for personal uses or for close proximity use, such as within a family or business environment.

        Maybe I don't understand what your trying to say but there is no point at all in encrypting without trust. If your saying you would rather use a local CA for internal business or family use this is an excellent idea.

        As a start I'd like to see the CA system revamped or replaced with multiple trust authorities, not just one chain and have meaningful teeth to eliminate trust associations with authorities who violate trust which seems to be more rampant and obvious as of late.

        This isn't ever going to happen unless trust anchors are deterministically derivable from DNS names implying little to no choice in your selection of a trust anchor.

        Names is all that you can use because it is all people are willing to accept. Nobody is willing to go to google.com and manually

        • Maybe I don't understand what your trying to say but there is no point at all in encrypting without trust. If your saying you would rather use a local CA for internal business or family use this is an excellent idea.

          Trust is at an arms length, so locally administered CAs make sense for these purposes. Trust works when all parties are trustworthy and it breaks down when you trust that deadbeat cousin Lin who still owes you money for that pizza from 5 years ago. At that point you should be able to prune cousin Lin from your XMAS card list. You can't however because then you're immediate family won't allow it. Apple not removing the Chinese CA for example.

          This isn't ever going to happen unless trust anchors are deterministically derivable from DNS names implying little to no choice in your selection of a trust anchor.

          Names is all that you can use because it is all people are willing to accept. Nobody is willing to go to google.com and manually enter or have to confirm use of the proper registry nor does relying on some coordinating structure do anything other than recreate the same problems in a different form.

          Well DNS is one mechanism but there can be others. I do think

          • by Bengie ( 1121981 )
            Configuring trust needs to be turn key simple, works out of the box, and even grandma can do it. Brand-new OS install, I should be able to hit www.mybank.com and trust that it really is www.mybank.com and not some random person doing a MITM.
            • well the problem is that grandma could be doing banking in China if a rogue CA issues a certificate that masques fraudulent activities.

    • by Meneth ( 872868 )

      Yep.

      Certificate validation is a defense against Man-in-the-Middle attacks. But the "Let's Encrypt" system is vulnerable to a MitM attack between its server and the server that would request the proper certificate.

      It can thus be fooled into issuing false certificates by the very people those certificates should defend against.

    • A CA isn't required at all to encrypt, just accept any self-signed certificate. If we want to introduce CAs or other method of identity verification, that may be fine but it is a different problem from encryption. We are seeing bits of this with the various opportunistic encryption extensions to SMTP and HTTP.
      • A CA isn't required at all to encrypt, just accept any self-signed certificate. If we want to introduce CAs or other method of identity verification, that may be fine but it is a different problem from encryption.

        When real people in the real world hear the word "encrypted" the word they actually hear is "secured" ... encryption without trust is a dangerously nonsensical illusion.

        We are seeing bits of this with the various opportunistic encryption extensions to SMTP and HTTP.

        What is the point? This does not stop the NSA
        from using QUANTUM INSERT and there is a very good chance anyone able to easedrop on wire has the means to spoof a few packets and coopt TCP sessions... so what does doing this buy you other than confusing people with doublespeak nobody understands?

      • by Bengie ( 1121981 )
        Self signed defeats the purpose of stopping a MITM. Yes, you do raise the bar because now the data cannot be passively viewed, but it's trivial to actively view it.
        • A self-signed certificate makes two guarantees. First, if the public key you see is the same public key you saw the first time you connected to that host, then a MITM probably hasn't been introduced since your first connection. SSH uses this "key continuity management" (KCM) or "trust on first use" (TOFU) model, as did OS X prior to the introduction of Gatekeeper. Granted, the MITM can harm the first connection to a given host.

          But the second guarantee even in the face of day-one MITM is route diversity. The

  • by Anonymous Coward

    ITbusinessweek is wrong: The linix foundation neither started or initiated this project, it only took over its hosting. The press release of the foundation clearly states this.

  • At some point, and my guess is pretty darn soon, reasonable people are going to have a very secure cryptobracelet that they never take off, or if you take it off it will never work again.

    The bracelet would work like the NFC chip in current phones, it would create unique identifiers for each transaction, so you can be verified that you are who you are without ever broadcasting your identity.

    Then, all email and every other communication can easily be encrypted, securely, and without adding complication. You

    • by stdarg ( 456557 )

      The bracelet would work like the NFC chip in current phones

      What's the benefit of making it a bracelet rather than a phone app? The phone already has the NFC chip you want.

      Then, all email and every other communication can easily be encrypted, securely, and without adding complication.

      How do you get the unique identifier from your bracelet to your PC? My PC doesn't have an NFC reader. If it did, again, I'd rather have it tie to my phone than a bracelet. You know what would be cool? A wireless charging pad with the NFC interface, so that you set your phone next to your computer on your desk, and all password requests from the PC are handled by the phone while it's physically the

      • What's the benefit of making it a bracelet rather than a phone app? The phone already has the NFC chip you want.

        Phones can get hacked. And most people are already storing passwords on their phones. What use is two-factor authentication if a malicious app can steal both factors at the same time?

        • by stdarg ( 456557 )

          Phones can get hacked... so? People are already starting to use phones as payment devices with credit card and banking information stored on the phone (e.g. Google Wallet, Apple Pay). They've long used mobile banking apps where you input your username/password. That ship has sailed... phones contain sensitive information.

          Anyway what's to say a bracelet with an NFC chip can't be compromised?

    • https://www.google.com/search?... [google.com]

      They exist in much better form factor. My watch annoys me enough that I take it off quite often, why would I want a bracelet I can't take off?

      • by Thagg ( 9904 )

        The problem with phones is that you can lose them or break them or have them stolen. I agree that it's a good place to start, though.

        I believe that the RFID tag that Coren22 suggests don't have, and can't have, the processing power required to do this right. You don't want to say "Yes, I'm 132132123123", that would be *way* too easy to fake. You want to have a back-and-forth communication that shows that you are who you are, without giving away your ID.

        I think the bracelet would become a status symbol --

        • It gives an idea of what is possible, now to see if someone can put something with a little processing power into a like form factor.

        • by vux984 ( 928602 )

          The problem with phones is that you can lose them or break them or have them stolen. I agree that it's a good place to start, though.

          How is that "not a problem" with a bracelet? Perhaps the bracelets are slightly less likely to be lost or stolen. Then again, I've found a lot more lost bracelets in the last 10 years than lost phones... and if they are valuable for identity theft, stealing them might well become a real thing.

    • Yeah, that's a terrible idea.

      First, it's wireless, so I can "grab" your identity when you walk by. That'll be handy. It's even going to be strapped to a similar body part, so I can know exactly where to "accidentally" bump into you if it requires pushing a button to activate.

      Second, you are transmitting the code through the purchase system. That's very handy, because I can just capture the code via your compromised PC.

      "Two-factor" authentication systems work because the data does not flow through a singl

      • by Thagg ( 9904 )

        We'll see.

        It's absolutely wrong that I am proposing a 'stealable' ID. No, it's not that at all. Like NFC (ApplePay and others) you don't send out your ID, your bracelet will engage in a two-way conversation that uses generates unique identifiers every time that prove that it's you without giving the system communicating with you the ability to impersonate you. It's not hard at all; we should have been doing this years ago. This is described in Bruce Schneier's Applied Cryptography twenty-fucking-years a

        • It's absolutely wrong that I am proposing a 'stealable' ID.

          And I didn't say you were proposing a 'stealable' ID. I said I can read the code remotely. Which lets me charge you $20, just as if you were making a purchase.

          See, your proposal failed to include any sort of verification by the bracelet-wearer that they wanted to make the purchase, or even verify the purchase amount.

          Even if you do require something like a button press, standard location and equipment means I can push the button on your bracelet by

        • Oh, you also neglected to pay attention to how your proposal enables man-in-the-middle attacks. Again, you lack any verification by the user. All the bracelet knows is that they were presented with a valid signature. I'm making a purchase in Wal-Mart, but your plan doesn't actually verify it's Wal-Mart's certificate.

  • Or at least, "software running on web servers"?

    Is it merely the case that any server (email, XMPP, murmur, etc.) you want to get a "valid" certificate for has to also have a webserver running on it to use this system, or is it literally only intended for "web servers"?

    • I suspect its for anywhere you want to provide TLS protected connections, SSL on webservers is just the biggest use case, so its going to get the attention initialy, but i dont see any reason why agents cant be built to handle the maintenance and signup protocol on other transports than http. SSL and HTTP are not co dependant.

      Its also going to be a big help in the migration to HTTP 2.0, which mandates SSL. I have a bunch of domains that i would like to move to HTTP 2.0 once it settles down, but im not up to

    • It takes literally four lines of code [piware.de] to bring up HTTPS on a Python 2 server.

      import BaseHTTPServer, SimpleHTTPServer, ssl
      httpd = BaseHTTPServer.HTTPServer(('localhost', 4443), SimpleHTTPServer.SimpleHTTPRequestHandler)
      httpd.socket = ssl.wrap_socket (httpd.socket, certfile='path/to/localhost.pem', server_side=True)
      httpd.serve_forever()

      So if you plan to use your TLS server only for inner protocols other than HTTP, I imagine someone will probably adapt Let's Encrypt to bring up a temporary HTTPS server when

  • The draft of the "Let's Encrypt" Certificate Policy is available in PDF here: https://letsencrypt.org/ISRG-C... [letsencrypt.org] Note that the PDF document's title is "Microsoft Word". I find that rather unusual for the Linux Foundation! Wasn't LibreOffice or some other Linux-available office suite good enough to write that document? I'm surprised that they are using a Windows desktop for everyday tasks such as document editing.
    • I'm surprised that they are using a Windows desktop for everyday tasks such as document editing.

      They're not, check the PDFinfo:


      [CronoCloud ~]$ pdfinfo ISRG-CP-Feb-18-2015-DRAFT.pdf
      Title: Microsoft Word - ISRG CP_ Draft 2_Clean_Draft_with_Revisions_2015-01-21.docx
      Keywords:
      Creator: Word
      Producer: Mac OS X 10.10.2 Quartz PDFContext

      They're using Word on OSX.

      • That is a bit reassuring. Still, one would expect that of all places, the Linux Foundation would be on a KDE desktop using LibreOffice.
        • Well, yes, but as was once said to me. The "creatives" who design/create what is essentially a press release like this tend to be running OSX.

          Another example is Linux Voice, the crowdfunded magazine. Their PDF's are done with Adobe Indesign on OSX.

          Because...:

          http://linux.slashdot.org/comm... [slashdot.org]

          • Thank you, that does explain a lot. We're a Linux shop as well, but our two graphics designers are both using the Adobe Suite on Windows.
  • The writer seems to me to be confused between encryption of web traffic and encryption of data in general.

    AFAIK, Let's Encrypt is all about making https universal. It has nothing to do with encypting application data.

Understanding is always the understanding of a smaller problem in relation to a bigger problem. -- P.D. Ouspensky

Working...