Slashdot is powered by your submissions, so send in your scoop

 



Forgot your password?
typodupeerror
The Internet Security IT Technology

Let's Encrypt Rolls Out Free Security Certs For IP Addresses (theregister.com) 23

Let's Encrypt, a certificate authority (CA) known for its free TLS/SSL certificates, has begun issuing digital certificates for IP addresses. From a report: It's not the first CA to do so. PositiveSSL, Sectigo, and GeoTrust all offer TLS/SSL certificates for use with IP addresses, at prices ranging from $40 to $90 or so annually. But Let's Encrypt does so at no cost.

For those with a static IP address who want to host a website, an IP address certificate provides a way to offer visitors a secure connection with that numeric identifier while avoiding the nominal expense of a domain name.

Let's Encrypt Rolls Out Free Security Certs For IP Addresses

Comments Filter:
  • I want certs for 127.0.0.1 and ::1 (they are mine).
    • Wait you need certs for that? Just who is it that you don't trust to snoop on your loopback network. ;-)

    • Nope, they're *mine*! I even have the T-shirt!

      "There's no place like 127.0.0.1"

      Whenever somebody tells me they think the shirt is funny, I accuse them of being a nerd.

  • I don't understand the use case. If I connect via TCP to some IP address 42.42.42.42, it's rather difficult for an attacker to actually connect me to a different IP address... much more difficult than spoofing a domain name.

    So, the certificate tells me "Yes, this really is 42.42.42.42." But I knew that already.

    Maybe for UDP, attacks are a bit more feasible, but even so... they're not exactly easy.

    I guess the only real use case I can see is to avoid a scary browser warning if you navigate to an IP ad

    • by mnmn ( 145599 ) on Thursday July 03, 2025 @12:29PM (#65493992) Homepage
      "it's rather difficult for an attacker to actually connect me to a different IP address"

      Is it really?

      Have you run a router or honeypot?
      • by dskoll ( 99328 )

        If an attacker can reroute traffic destined for a specific IP address, then they can also obtain a certificate for that IP address by running the ACME challenge. (Same for the ACME HTTP challenge, actually...)

        The only way this would fail is if an attacker can reroute my traffic, but not the traffic needed for the ACME challenge.

        • by fr ( 185735 )

          Um, no.
          Just because you can reroute any IP on networks you control doesn't mean you can do shit on networks outside your control.

          For example... If i setup a free wifi and let people connect, i can reroute the web traffic to my webserver. But no, that doesn't help me getting a valid certificate whatsoever.

          • While I'm not sure of the technicalities which may prevent this I don't think that's quite right. If you can reroute traffic to your IP address then you can in theory also perform the necessary challenges in order to get the cert issued. IP address certs are not issued through a DNS challenge (obviously) as such no login or access to DNS management is required, only http-01 certification. So if you can re-route the IP to your machine for the purpose of spoofing you absolutely have the capability to respond

            • by tepples ( 727027 )

              Different machines can respond to the same IP address as seen from the Internet vs. from a coffee shop's guest WLAN. Let's Encrypt sees only the former when evaluating an http-01 challenge. If you associate to a guest WLAN and connect to https://42.42.42.42/ [42.42.42.42] and it offers a certificate issued by Let's Encrypt, that means you're seeing the same server that Let's Encrypt saw through the Internet, not a server on the guest WLAN that's intercepting your connection.

          • by dskoll ( 99328 )

            OK, yes, the free Wifi scenario makes sense.

            But I still think it's a bit weird to have proof of identity for IP addresses. For example, if a host presents a valid certificate for "example.com", then I can be reasonably confident that the host I'm talking to is controlled by whoever registered the domain "example.com", barring a compromised machine or leaked private key. There's a trail from the domain registrar to the name servers to the host.

            But if someone tells me to visit 16.34.212.76 I have no ide

        • by Entrope ( 68843 )

          One of the key parts of ACME is that cert issuers are supposed to check the certificate from different points on the Internet, so that they have a good chance of seeing different answers if that kind of MitM attack happens. They won't necessarily know which is the true server response, but they will not issue a certificate if they see a mismatch.

    • by EvilSS ( 557649 )
      Glad to hear we have eliminated all man in the middle attacks. Mission Accomplished!
    • I don't understand the use case.

      Some things need to work when most everything on the network is broken. Think: out of band access to the DNS server (DRAC, ILO, IPMI).

      So, the certificate tells me "Yes, this really is 42.42.42.42." But I knew that already.

      No, you know that some machine out there responded to that IP address. You don't know whether it's the one you meant or, say, the hotel's captive portal.

      • None of those things you listed are open to the general public, so there is no reason not to use a self signed certificate.

        • Other than that new versions of mainstream operating systems and web browsers make it harder for the owner of a device to trust the root certificate of a particular private CA. I seem to remember, for example, that iOS and Android put a scary warning on the lock screen if one or more user-trusted root certificates is installed, and Android application developers have to opt into user-trusted root certificates through a "Network Security Config".

    • by allo ( 1728082 )

      You could say the same for a domain name.

      In both cases the attack is to intercept your traffic and route you to another destination.

    • by xlsior ( 524145 )
      Note validating the destination server name is not the only purpose of an SSL cert -- it also encrypts the traffic between the browser and the server, which could otherwise contain potentially unencrypted usernames, passwords, or credit card information.

      Anyone in between you and the server can potentially snoop on the data packets in transit, but it is far less likely that they can decypher it when you use SSL than with plain unencrypted HTTP. Yes, you can access a server by IP that uses an SSL cert assoc
      • by dskoll ( 99328 )

        The SSL cert doesn't "encrypt the traffic". It's solely used as proof of identity.

        You can have proof of identity without encryption, and you can have encryption without proof of identity.

  • Most applications are DNS-routed and DNS is the security layer for all things HTTP.

    So this feature really is for old and stuck technologies and bad designs that are hard to change.

    I'm glad they did. Bad designs deserve security too. But they deserve redesign more.
    • by crbowman ( 7970 )

      You can use IP address in your web browser, you don't have to type in a DNS location.

    • Agreed. It annoys me when IT departments tell you to access a resource by giving you an IP address. The whole point of DNS, is that IP addresses change. You don't want your website, or your security cert, to change just because for whatever reason, you need to move to a different IP address. Use DNS, it's there for a reason!

    • Really old and stuck technologies.... that require TLS and have up to date certificate authority lists. The root cert that lets encrypt uses has only existed since 2016

You may call me by my name, Wirth, or by my value, Worth. - Nicklaus Wirth

Working...