Re: letsencrypt && https && openbsd.org = https://www.openbsd.org/

2015-12-15 Thread Kevin Chadwick
> It's not so much about replacing keys which aren't strong enough (and > actually you can just replace the old key+cert in that case), it's > about dealing with compromised keys. > > Certificate revocation is a disaster area. CRLs are often not checked > at all (letsencrypt aren't even generating

Re: letsencrypt && https && openbsd.org = https://www.openbsd.org/

2015-12-14 Thread Stuart Henderson
On 2015-12-12, Kevin Chadwick wrote: >> > and have to keep changing the cert every year. >> >> Your certificate cycling process should be automated, and it should >> happen more frequently than once a year. > > Complete nonsense > > firstly and not a major point but you may have greater securit

Re: letsencrypt && https && openbsd.org = https://www.openbsd.org/

2015-12-13 Thread Joel Rees
On Mon, Dec 14, 2015 at 11:00 AM, Michael McConville wrote: > Joel Rees wrote: >> Daniel Ouellet wrote: >> > > Secondly, this whole thread should have ended long ago. >> > >> > So why you keep it going then. >> > >> > Let it die please >> >> Flame wars are educational, for readers with an open min

Re: letsencrypt && https && openbsd.org = https://www.openbsd.org/

2015-12-13 Thread Michael McConville
Joel Rees wrote: > Daniel Ouellet wrote: > > > Secondly, this whole thread should have ended long ago. > > > > So why you keep it going then. > > > > Let it die please > > Flame wars are educational, for readers with an open mind. Flame wars and crypto speculation also make a lot of noise and dri

Re: letsencrypt && https && openbsd.org = https://www.openbsd.org/

2015-12-13 Thread Joel Rees
On Sun, Dec 13, 2015 at 5:00 PM, Daniel Ouellet wrote: >> Secondly, this whole thread should have ended long ago. > > So why you keep it going then. > > Let it die please Flame wars are educational, for readers with an open mind. And I think I'll air my own two armpits, off-list: http://free-is

Re: letsencrypt && https && openbsd.org = https://www.openbsd.org/

2015-12-13 Thread Daniel Ouellet
> Secondly, this whole thread should have ended long ago. So why you keep it going then. Let it die please

Re: letsencrypt && https && openbsd.org = https://www.openbsd.org/

2015-12-12 Thread ludovic coues
2015-12-13 7:17 GMT+01:00 Delan Azabani : > On Sun, Dec 13, 2015 at 6:28 AM, Kevin Chadwick wrote: >> On a low traffic site it already annoys me that I have to change it >> once per year with startSSL. > > This is what the tooling provided by Let's Encrypt is designed to > solve. It shouldn't be h

Re: letsencrypt && https && openbsd.org = https://www.openbsd.org/

2015-12-12 Thread Delan Azabani
On Sun, Dec 13, 2015 at 6:28 AM, Kevin Chadwick wrote: > On a low traffic site it already annoys me that I have to change it > once per year with startSSL. This is what the tooling provided by Let's Encrypt is designed to solve. It shouldn't be hard to issue new certificates, and for many applica

Re: letsencrypt && https && openbsd.org = https://www.openbsd.org/

2015-12-12 Thread Kevin Chadwick
> > and have to keep changing the cert every year. > > Your certificate cycling process should be automated, and it should > happen more frequently than once a year. Complete nonsense firstly and not a major point but you may have greater security than automating key changes and secondly the o

Re: letsencrypt && https && openbsd.org = https://www.openbsd.org/

2015-12-12 Thread Kevin Chadwick
> > I would consider signify keys printed on CDs and copied across several > > web sites safer than trusting the hundreds of CA certs shipped with a > > standard web browser. > > Didn't we just established that with HPKP you can disregard the CA > completely? At least if you trust your fist acce

Re: letsencrypt && https && openbsd.org = https://www.openbsd.org/

2015-12-12 Thread Andy Bradford
Thus said Tati Chevron on Fri, 11 Dec 2015 13:16:23 +: > On the other hand, if somebody actually received a fake OpenBSD CD in > the mail, and it was discovered, it would be a huge news story within > the IT industry. A bad download, much less so. My OpenBSD 5.7 CD arrived with a green l

Re: letsencrypt && https && openbsd.org = https://www.openbsd.org/

2015-12-12 Thread Delan Azabani
On Sat, Dec 12, 2015 at 7:11 PM, Constantine A. Murenin wrote: > once you give in to https once, you're hooked You're only hooked if you use HSTS. > and have to keep paying someone every year, There are at least three CAs that provide free certificates, and one of those is Let's Encrypt. > and

Re: letsencrypt && https && openbsd.org = https://www.openbsd.org/

2015-12-12 Thread Constantine A. Murenin
On 11 December 2015 at 03:58, Kamil Cholewiński wrote: >> The official CD set contains the signify keys for that release and the >> next one. Once you have a known good copy of one set, you can always obtain >> future ones securely. >> >> You don't even need to use the CD set to install, just as

Re: letsencrypt && https && openbsd.org = https://www.openbsd.org/

2015-12-11 Thread Anthony J. Bentley
Kevin Chadwick writes: > What is your problem with it, there are many VPN services promoted > precisely for this issue as it completely rather than partially stops > ISP's monitoring traffic like TalkTalks homesafe service that is > likely hackable itself. Why encrypt anything? Just run it through

Re: letsencrypt && https && openbsd.org = https://www.openbsd.org/

2015-12-11 Thread Kevin Chadwick
> Kevin Chadwick writes: > > The cvs page fingerprint page could be https enabled, however you can > > use googles cache over https, also buy a CD to help the project greatly > > would do far more for world security than TLS everywhere and even look > > at mailing list archives over https as a web

Re: letsencrypt && https && openbsd.org = https://www.openbsd.org/

2015-12-11 Thread Oriol Demaria
I agree, but no one mentioned DANE, I think that's the future and the way to go. With DANE in theory you wouldn't need a CA. I think it's an excellent way to establish authenticity of your content. Problem is that no browser supports it by default, and DNSsec use is marginal. Regards, Giancarlo R

Re: letsencrypt && https && openbsd.org = https://www.openbsd.org/

2015-12-11 Thread Stuart Henderson
On 2015-12-11, Constantine A. Murenin wrote: > On 11 December 2015 at 02:58, Thijs van Dijk wrote: >> On 11 December 2015 at 05:51, Andy Bradford >> wrote: >> >>> If one wants privacy on a website then more is required than just HTTPS. >>> >> >> Right. *I* just want a reasonable (256-bit) guaran

Re: letsencrypt && https && openbsd.org = https://www.openbsd.org/

2015-12-11 Thread Giancarlo Razzolini
Em 11-12-2015 09:28, Stefan Sperling escreveu: > I would consider signify keys printed on CDs and copied across several > web sites safer than trusting the hundreds of CA certs shipped with a > standard web browser. Didn't we just established that with HPKP you can disregard the CA completely? At

Re: letsencrypt && https && openbsd.org = https://www.openbsd.org/

2015-12-11 Thread nanaya
Hi, On Fri, Dec 11, 2015, at 23:39, Raul Miller wrote: > On Fri, Dec 11, 2015 at 7:10 AM, Tati Chevron > wrote: > > Why would we trust your mirror? > > A couple things to keep in mind here: > > (1) Security can never be perfect. > (2) Security does not have to be perfect. > And here's a kind

Re: letsencrypt && https && openbsd.org = https://www.openbsd.org/

2015-12-11 Thread Raul Miller
On Fri, Dec 11, 2015 at 7:10 AM, Tati Chevron wrote: > Why would we trust your mirror? A couple things to keep in mind here: (1) Security can never be perfect. (2) Security does not have to be perfect. (That said... sometimes traditional computer security seems like people are trying to put ban

Re: letsencrypt && https && openbsd.org = https://www.openbsd.org/

2015-12-11 Thread Giancarlo Razzolini
Em 10-12-2015 20:03, Christian Weisgerber escreveu: > The true elephant in the room is that I can't get the current OpenBSD > source tree securely. (Well, _I_ can if push comes to shove, but > the general user community can't.) CVSync? No integrity or > authenticity. AnonCVS over SSH? Nope, no

Re: letsencrypt && https && openbsd.org = https://www.openbsd.org/

2015-12-11 Thread Thijs van Dijk
On 11 December 2015 at 14:16, Tati Chevron wrote: > But even if PKI were actively on fire at the moment (which it is not), >> what's wrong with doing both? >> > > Basically the gain verses the effort and resources expended. > > I agree that there is a value in distributing keys and source code in

Re: letsencrypt && https && openbsd.org = https://www.openbsd.org/

2015-12-11 Thread Constantine A. Murenin
On 11 December 2015 at 02:58, Thijs van Dijk wrote: > On 11 December 2015 at 05:51, Andy Bradford > wrote: > >> If one wants privacy on a website then more is required than just HTTPS. >> > > Right. *I* just want a reasonable (256-bit) guarantee that the signify keys > on my screen are the ones t

Re: letsencrypt && https && openbsd.org = https://www.openbsd.org/

2015-12-11 Thread Constantine A. Murenin
On 11 December 2015 at 05:37, Anthony J. Bentley wrote: > "Constantine A. Murenin" writes: >> On 8 December 2015 at 19:26, Anthony J. Bentley wrote: >> > Giancarlo Razzolini writes: >> >> One of the main benefits of the TLS wouldn't only be to render >> >> impossible for anyone to know which page

Re: letsencrypt && https && openbsd.org = https://www.openbsd.org/

2015-12-11 Thread Tati Chevron
On Fri, Dec 11, 2015 at 01:53:04PM +0100, Thijs van Dijk wrote: On 11 December 2015 at 13:17, Tati Chevron wrote: Would you really trust HTTPS more than a physical CD being mailed to you??? Yes. Both provide some level of accountability, however with PKI you explicitly trust a limited (tho

Re: letsencrypt && https && openbsd.org = https://www.openbsd.org/

2015-12-11 Thread Thijs van Dijk
On 11 December 2015 at 13:51, Tati Chevron wrote: > ...and intercept the package being delivered to you? > > Yes, it's possible, but somebody who had the resources to go to that > extreme, and a motive to single you out as a target, would presumably > have other ways to invade your privacy and in

Re: letsencrypt && https && openbsd.org = https://www.openbsd.org/

2015-12-11 Thread Thijs van Dijk
On 11 December 2015 at 13:17, Tati Chevron wrote: > Would you really trust HTTPS more than a physical CD being mailed to > you??? Yes. Both provide some level of accountability, however with PKI you explicitly trust a limited (though big) numer of third parties to do their job properly, and in

Re: letsencrypt && https && openbsd.org = https://www.openbsd.org/

2015-12-11 Thread Tati Chevron
On Fri, Dec 11, 2015 at 01:28:04PM +0100, Kamil Cholewi??ski wrote: The official CDs have the signify key physically printed on them. You press a new CD, print a new cover, etc. ...and intercept the package being delivered to you? Yes, it's possible, but somebody who had the resources to go

Re: letsencrypt && https && openbsd.org = https://www.openbsd.org/

2015-12-11 Thread Kamil Cholewiński
> The official CDs have the signify key physically printed on them. You press a new CD, print a new cover, etc. > If you want to rely on third parties, I can send you a copy of the > signify keys, signed by my PGP key. How would that help you at all? Sounds reasonable to me.

Re: letsencrypt && https && openbsd.org = https://www.openbsd.org/

2015-12-11 Thread Tati Chevron
On Fri, Dec 11, 2015 at 12:48:19PM +0100, Thijs van Dijk wrote: I'm saying I shouldn't *have* to rely on snail-mailed physical media. We, as a species, have thought of a solution to this problem long ago. I agree in principle that we shouldn't have to rely in physical media to obtain the keys w

Re: letsencrypt && https && openbsd.org = https://www.openbsd.org/

2015-12-11 Thread Tati Chevron
On Fri, Dec 11, 2015 at 12:58:38PM +0100, Kamil Cholewi??ski wrote: This is the real thing bothering me. I don't even have a CD drive available, and I was about to ask if it would be possible to get the signify keys via paper mail in exchange for a donation. The official CDs have the signify ke

Re: letsencrypt && https && openbsd.org = https://www.openbsd.org/

2015-12-11 Thread Tati Chevron
On Fri, Dec 11, 2015 at 04:37:39AM -0700, Anthony J. Bentley wrote: Why even bring up OpenBSD 2.3? Anyone running that 19 years after its release has much bigger problems than not being able to connect to www.openbsd.org. I must admit that since gopher://openbsd.org shut down, and tenex support

Re: letsencrypt && https && openbsd.org = https://www.openbsd.org/

2015-12-11 Thread Thijs van Dijk
On 11 December 2015 at 13:10, Tati Chevron wrote: > In either case, I'd be willing to put my money where my mouth is. >> Whom do I contact about running a site mirror? >> > > Why would we trust your mirror? Touché.

Re: letsencrypt && https && openbsd.org = https://www.openbsd.org/

2015-12-11 Thread Kamil Cholewiński
> The official CD set contains the signify keys for that release and the > next one. Once you have a known good copy of one set, you can always obtain > future ones securely. > > You don't even need to use the CD set to install, just as a way of obtaining > the signify keys with a high degree of c

Re: letsencrypt && https && openbsd.org = https://www.openbsd.org/

2015-12-11 Thread Thijs van Dijk
On 11 December 2015 at 12:28, Stefan Sperling wrote: > I would consider signify keys printed on CDs and copied across several > web sites safer than trusting the hundreds of CA certs shipped with a > standard web browser. On 11 December 2015 at 12:35, Tati Chevron wrote: > The official CD set

Re: letsencrypt && https && openbsd.org = https://www.openbsd.org/

2015-12-11 Thread Anthony J. Bentley
"Constantine A. Murenin" writes: > On 8 December 2015 at 19:26, Anthony J. Bentley wrote: > > Giancarlo Razzolini writes: > >> One of the main benefits of the TLS wouldn't only be to render > >> impossible for anyone to know which pages you're accessing on the site, > >> but also the fact that we

Re: letsencrypt && https && openbsd.org = https://www.openbsd.org/

2015-12-11 Thread Tati Chevron
On Fri, Dec 11, 2015 at 11:58:17AM +0100, Thijs van Dijk wrote: On 11 December 2015 at 05:51, Andy Bradford wrote: If one wants privacy on a website then more is required than just HTTPS. Right. *I* just want a reasonable (256-bit) guarantee that the signify keys on my screen are the ones t

Re: letsencrypt && https && openbsd.org = https://www.openbsd.org/

2015-12-11 Thread Stefan Sperling
On Fri, Dec 11, 2015 at 11:58:17AM +0100, Thijs van Dijk wrote: > On 11 December 2015 at 05:51, Andy Bradford > wrote: > > > If one wants privacy on a website then more is required than just HTTPS. > > > > Right. *I* just want a reasonable (256-bit) guarantee that the signify keys > on my screen

Re: letsencrypt && https && openbsd.org = https://www.openbsd.org/

2015-12-11 Thread Thijs van Dijk
On 11 December 2015 at 05:51, Andy Bradford wrote: > If one wants privacy on a website then more is required than just HTTPS. > Right. *I* just want a reasonable (256-bit) guarantee that the signify keys on my screen are the ones the OpenBSD authors intended me to see. I currently just assume t

Re: letsencrypt && https && openbsd.org = https://www.openbsd.org/

2015-12-11 Thread Constantine A. Murenin
On 8 December 2015 at 19:26, Anthony J. Bentley wrote: > Giancarlo Razzolini writes: >> One of the main benefits of the TLS wouldn't only be to render >> impossible for anyone to know which pages you're accessing on the site, >> but also the fact that we would get a little more security getting th

Re: letsencrypt && https && openbsd.org = https://www.openbsd.org/

2015-12-10 Thread Andy Bradford
Thus said Jason Barbier on Tue, 08 Dec 2015 10:14:37 -0800: > It is a read only site, the privacy you seek is breached as soon as > you make a DNS call to openbsd.org Not to mention the Subject on the SSL certificate will most likely be www.openbsd.org, and perhaps there's also SNI,

Re: letsencrypt && https && openbsd.org = https://www.openbsd.org/

2015-12-10 Thread Christian Weisgerber
On 2015-12-08, szs wrote: > So with letsencrypt here, how about making the main site > default to https? Is this a good idea or is this a great idea? I would like it a lot if www.openbsd.org and cvsweb.openbsd.org switched to https, but I'm not in a position to make it happen. Much of the discu

Re: letsencrypt && https && openbsd.org = https://www.openbsd.org/

2015-12-09 Thread Giancarlo Razzolini
Em 08-12-2015 23:23, Stuart Henderson escreveu: > I wasn't aware that > it lets you disregard the CAs though Once the client has the two certs pinned (the primary and the backup), if a malicious CA try to impersonate the server using a forged (although perfectly valid) certificate, the client shou

Re: letsencrypt && https && openbsd.org = https://www.openbsd.org/

2015-12-09 Thread Anthony J. Bentley
Kevin Chadwick writes: > The cvs page fingerprint page could be https enabled, however you can > use googles cache over https, also buy a CD to help the project greatly > would do far more for world security than TLS everywhere and even look > at mailing list archives over https as a web of trust.

Re: letsencrypt && https && openbsd.org = https://www.openbsd.org/

2015-12-09 Thread Kevin Chadwick
> In the case of www.openbsd.org, using HTTPS isn't so much about > privacy as it is about integrity. Yes, signify(1) is a thing, but > using HTTPS in addition to it would make release and package > downloads more difficult to tamper with. Well packages usually come from mirrors which I know from

Re: letsencrypt && https && openbsd.org = https://www.openbsd.org/

2015-12-09 Thread Craig Skinner
On 2015-12-08 Tue 12:06 PM |, szs wrote: > So with letsencrypt here, how about making the main site > default to https? Is this a good idea or is this a great idea? > Copy & Paste from 2013: "OpenBSD site SSL" http://marc.info/?t=13815459562&r=1&w=2 Please don't. That would slow it down & e

Re: letsencrypt && https && openbsd.org = https://www.openbsd.org/

2015-12-08 Thread Raul Miller
On Tue, Dec 8, 2015 at 11:22 PM, Nick Holland wrote: > https is a joke. IF and WHEN it works properly, it's too complex for > the real world to understand (ahem...and even recognize). That's not the joke, though - that's the punchline. (1) "Secure" and "Security" mean different (and often confl

Re: letsencrypt && https && openbsd.org = https://www.openbsd.org/

2015-12-08 Thread Delan Azabani
On Wed, Dec 9, 2015 at 12:22 PM, Nick Holland wrote: > HAHAHHAHAHA... > you think adding a certificate changes this? > https is a joke. "Some people implement HTTPS poorly sometimes, so we shouldn't try." The amount of effort "wasted" on Let's Encrypting the OpenBSD website is so small compared

Re: letsencrypt && https && openbsd.org = https://www.openbsd.org/

2015-12-08 Thread Nick Holland
On 12/08/15 20:26, Anthony J. Bentley wrote: > Giancarlo Razzolini writes: >> One of the main benefits of the TLS wouldn't only be to render >> impossible for anyone to know which pages you're accessing on the site, >> but also the fact that we would get a little more security getting the >> SSH fi

Re: letsencrypt && https && openbsd.org = https://www.openbsd.org/

2015-12-08 Thread Stuart Henderson
On 2015-12-09, Giancarlo Razzolini wrote: > Also, now that we have two free TLS certs providers, one can use HPKP > and completely disregard the CA's, which is a security benefit. Also wosign (and, sort-of, cloudflare). btw, HPKP doesn't work too well with letsencrypt as-is (which wants to genera

Re: letsencrypt && https && openbsd.org = https://www.openbsd.org/

2015-12-08 Thread Anthony J. Bentley
Giancarlo Razzolini writes: > One of the main benefits of the TLS wouldn't only be to render > impossible for anyone to know which pages you're accessing on the site, > but also the fact that we would get a little more security getting the > SSH fingerprints for the anoncvs servers. Having them in

Re: letsencrypt && https && openbsd.org = https://www.openbsd.org/

2015-12-08 Thread Giancarlo Razzolini
Em 08-12-2015 16:24, Michael McConville escreveu: > There are still some privacy benefits to using HTTPS. It will confound a > lot of simple filtering and monitoring software, and what you're reading > on the site is pretty obfuscated. It also helps security on sketchy > networks. > > HTTPS isn't a

Re: letsencrypt && https && openbsd.org = https://www.openbsd.org/

2015-12-08 Thread Stuart Henderson
On 2015-12-08, Michael McConville wrote: > Jason Barbier wrote: >> szs wrote: >> > Not for security. >> > For privacy. >> >> It is a read only site, the privacy you seek is breached as soon as >> you make a DNS call to openbsd.org > > There are still some privacy benefits to using HTTPS. It will

Re: letsencrypt && https && openbsd.org = https://www.openbsd.org/

2015-12-08 Thread Kevin Chadwick
> >It would actually reduce the security and potential for DDOS against > >openbsd.org despite the heroic efforts that have gone into LibreSSL. So > >where's the benefit to risk analysis for OpenBSD? > > Don't you mean reduce the securiry and _increase_ the potential for > DDOS against openbsd.o

Re: letsencrypt && https && openbsd.org = https://www.openbsd.org/

2015-12-08 Thread Tati Chevron
On Tue, Dec 08, 2015 at 10:11:34PM +, Kevin Chadwick wrote: It would actually reduce the security and potential for DDOS against openbsd.org despite the heroic efforts that have gone into LibreSSL. So where's the benefit to risk analysis for OpenBSD? Don't you mean reduce the securiry and _

Re: letsencrypt && https && openbsd.org = https://www.openbsd.org/

2015-12-08 Thread Kevin Chadwick
> > So with letsencrypt here, how about making the main site > > default to https? Is this a good idea or is this a great idea? > > Don't mistake encryption for security. It would actually reduce the security and potential for DDOS against openbsd.org despite the heroic efforts that have gone i

Re: letsencrypt && https && openbsd.org = https://www.openbsd.org/

2015-12-08 Thread Raul Miller
On Tue, Dec 8, 2015 at 3:23 PM, Ted Unangst wrote: > Michael McConville wrote: >> Yes, but it is certainly "Websense" difficult, "Verizon traffic >> monetization dept." difficult, "nosy VPN/exit node operator" difficult, >> and "guy in cafe with Wireshark" difficult. > > But we don't care about an

Re: letsencrypt && https && openbsd.org = https://www.openbsd.org/

2015-12-08 Thread Michael McConville
Ted Unangst wrote: > Michael McConville wrote: > > Jason Barbier wrote: > > > szs wrote: > > > > Not for security. > > > > For privacy. > > > > > > It is a read only site, the privacy you seek is breached as soon as > > > you make a DNS call to openbsd.org > > > > There are still some privacy ben

Re: letsencrypt && https && openbsd.org = https://www.openbsd.org/

2015-12-08 Thread Ted Unangst
Michael McConville wrote: > Yes, but it is certainly "Websense" difficult, "Verizon traffic > monetization dept." difficult, "nosy VPN/exit node operator" difficult, > and "guy in cafe with Wireshark" difficult. But we don't care about any of those people anymore. The NSA is the only bad guy worth

Re: letsencrypt && https && openbsd.org = https://www.openbsd.org/

2015-12-08 Thread Ted Unangst
Michael McConville wrote: > Jason Barbier wrote: > > szs wrote: > > > Not for security. > > > For privacy. > > > > It is a read only site, the privacy you seek is breached as soon as > > you make a DNS call to openbsd.org > > There are still some privacy benefits to using HTTPS. It will confound

Re: letsencrypt && https && openbsd.org = https://www.openbsd.org/

2015-12-08 Thread Michael McConville
Jason Barbier wrote: > szs wrote: > > Not for security. > > For privacy. > > It is a read only site, the privacy you seek is breached as soon as > you make a DNS call to openbsd.org There are still some privacy benefits to using HTTPS. It will confound a lot of simple filtering and monitoring sof

Re: letsencrypt && https && openbsd.org = https://www.openbsd.org/

2015-12-08 Thread Jason Barbier
rivacy. > > > Original Message > Subject: Re: letsencrypt && https && openbsd.org = > https://www.openbsd.org/ > Local Time: December 8 2015 5:36 pm > UTC Time: December 8 2015 5:36 pm > From: s...@spacehopper.org > To: misc@openbsd.org > >

Re: letsencrypt && https && openbsd.org = https://www.openbsd.org/

2015-12-08 Thread szs
Not for security. For privacy. Original Message Subject: Re: letsencrypt && https && openbsd.org = https://www.openbsd.org/ Local Time: December 8 2015 5:36 pm UTC Time: December 8 2015 5:36 pm From: s...@spacehopper.org To: misc@openbsd.org On 2015-12-08,

Re: letsencrypt && https && openbsd.org = https://www.openbsd.org/

2015-12-08 Thread Ted Unangst
Stuart Henderson wrote: > > Besides, who is going to agree to the Subscriber Agreement and indemnify ISRG? Huh? You don't trust robots to perform surgery correctly? oh, wrong ISRG.

Re: letsencrypt && https && openbsd.org = https://www.openbsd.org/

2015-12-08 Thread Stefan Sperling
On Tue, Dec 08, 2015 at 12:06:52PM -0500, szs wrote: > Fb jvgu yrgfrapelcg urer, ubj nobhg znxvat gur znva fvgr > qrsnhyg gb uggcf? Vf guvf n tbbq vqrn be vf guvf n terng vqrn? I'm sorry, I couldn't read your message because it was encrypted. How about you sign your messages instead? That way, eve

Re: letsencrypt && https && openbsd.org = https://www.openbsd.org/

2015-12-08 Thread Stuart Henderson
On 2015-12-08, szs wrote: > So with letsencrypt here, how about making the main site > default to https? Is this a good idea or is this a great idea? Don't mistake encryption for security. Besides, who is going to agree to the Subscriber Agreement and indemnify ISRG?

letsencrypt && https && openbsd.org = https://www.openbsd.org/

2015-12-08 Thread szs
So with letsencrypt here, how about making the main site default to https? Is this a good idea or is this a great idea?