On 2016-09-28 10:25, li...@lazygranch.com wrote:
> I don't want take this thread off course, but suggestions for low cost certs 
> would be appreciated. I don't like how Let's Encrypt works, else that would 
> be the obvious solution. 

"how Let's Encrypt works" is a bit vague. Domain verification is
standard for a lot of registrars (and safer than what StartSSL does,
which is allowing you to breach their TOS if you pay hush money), and
there are LE clients that don't automatically fuck up your server
configs, if that's your concern (we use simp_le, e.g., it just generates
the certs and everything else is up to you).

> Domain registration isn't free. Server time isn't free. Something like $20 a 
> year would be fine. I already have a self signed cert for email, but would 
> like to eventually encrypt my websites and attempt dnssec/dane.

Have you considered CACert? Otherwise it's either scummy registrars that
ought to be the next on the chop block (like Comodo) or gets expensive
fast. (Or both.)

> When Symantec first announced that they would compete with Let's Encrypt, I 
> signed up with them. But it looks like their free cert program is more like 
> you need to recruit customers for them.

Same with the others. Of course they want to stay in business, even if
it's dead already.

> 
> 
>   Original Message  
> From: Sven Schwedas
> Sent: Wednesday, September 28, 2016 1:10 AM
> To: postfix-users@postfix.org
> Subject: Re: WoSign/StartCom CA in the news
> 
> On 2016-09-28 00:31, Giovanni Harting wrote:
>> Correct me if I'm wrong, but that document you describe issues by
>> Mozilla and others, doesn't it state that it would only affect new
>> issues certs after a certain date?
> 
> Yes, but most StartSSL/WoSign certificates are only valid for a year or
> less. So customers should start looking for alternative providers *now*,
> because a year-long block will affect almost all of them.
> 
>> Am 09/28/16 um 00:29 schrieb Viktor Dukhovni:
>>> WoSign (who seemingly purchased StartCom) seem to have run into
>>> some compliance issues as reported by Firefox:
>>>
>>>
>>> http://arstechnica.com/security/2016/09/firefox-ready-to-block-certificate-authority-that-threatened-web-security/
>>>
>>>
>>> Many SMTP servers are using certs from StartCom. In my DANE
>>> adoption survey, out of 2201 certificates used by DANE MX
>>> hosts 411 are issued by StartCom and 47 by WoSign. So that's
>>> just over 20% of observed certificates. While the rate is
>>> likely different for the larger SMTP ecosystem (DANE users
>>> are bleeding edge, not representative at this time), I expect
>>> that these CAs are still quite popular overall.
>>>
>>> If you're using StartCom/WoSign certs, and rely on them being
>>> verified by MUAs and/or peer MTAs. you may want to make
>>> contingency plans if Mozilla and perhaps others go through
>>> with delisting (or disabling) the related root CAs from
>>> their trusted CA bundles.
>>>
>>
> 

-- 
Mit freundlichen Grüßen, / Best Regards,
Sven Schwedas, Systemadministrator
Mail/XMPP sven.schwe...@tao.at | Skype sven.schwedas
TAO Digital | Lendplatz 45 | A8020 Graz
https://www.tao-digital.at | Tel +43 680 301 7167

Attachment: signature.asc
Description: OpenPGP digital signature

Reply via email to