BLU Discuss list archive
[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
[Discuss] [BLU/Officers] update instructions for key signing
- Subject: [Discuss] [BLU/Officers] update instructions for key signing
- From: bill.n1vux at gmail.com (Bill Ricker)
- Date: Mon, 17 Sep 2018 13:32:04 -0400
- In-reply-to: <20180917152743.a3eqdvpz54ksm4ma@randomstring.org>
- References: <CAPOg-Py6+yYCcEKNYESd73Vp+CMgSyM8htPtte8ZAj1t-VTJSg@mail.gmail.com> <CAPOg-PwcihOuHn_vmpUz14ncXqvnikUftp-8COt3_rVadVWgNQ@mail.gmail.com> <CAPOg-PzP9iRU1bn=bQdMF=k3BOOsuyWyUBUJfqSmDi5aWM25_w@mail.gmail.com> <CAPOg-Py+j5d3z6X8mrYJ+BGSc7=97k-ddub=3wPiYsd==uJwpA@mail.gmail.com> <CAAbKA3V_=5Hy=SwtZxM2JH1eZ7pTYzXPoX8LW--crkgpB6efQg@mail.gmail.com> <3f289390-7b71-6159-0f1f-8d532fe9ae33@horne.net> <20180917152743.a3eqdvpz54ksm4ma@randomstring.org>
On Mon, Sep 17, 2018, 11:27 Dan Ritter <dsr at randomstring.org> wrote: > > Since my browser now flags non-https sites as "Unsecure," I'd like to > know > > how to generate a key to put in my Apache setup which will swing the > > padlocks shut. I know that it won't be "valid" unless I import the key > into > > my browser, but that's a one-time effort and will stop the "unsecure" > > messages when I ask people to visit my websites. > > > > Also, if possible, I'd like to be able to pass out keys for users to use > in > > lieu of passwords to access secured areas. > > > > Please tell me how to go about that, and thanks in advance. > > The easiest and best thing to do is to get SSL certs from Let's > Encrypt. > > Everything else is worse and harder. > Correct. Even the US DOD is getting away from self signed certs that have to be injected or accepted, because that trains users to be too trusting. The only valid use case for DIY webserver certs are (a) internal alphatest/Qa sites, which will then scream holy murder if prod traffic gets misrouted to them; (b) closed intranet (no BYOD allowed) where one IT org controls both the desktops and the webservers, and you install the Corp private selfsigned CA key into IT release of IE/Edge, FF, Chrome. Yes, it is in theory possible to distribute keys to authenticate a browser to the webserver. Browser side user certs can be useful in a DIY 2FA scheme but I'd not recommend it as 1FA !! This may seem like a good idea but doesn't really do what one usually wants; it turns just their phone or laptop into a large losable 1FA dongle. Possibly safe only if you control their password and screensaver policy. >
- Follow-Ups:
- [Discuss] [BLU/Officers] update instructions for key signing
- From: warlord at MIT.EDU (Derek Atkins)
- [Discuss] [BLU/Officers] update instructions for key signing
- References:
- [Discuss] [BLU/Officers] update instructions for key signing
- From: bill at horne.net (Bill Horne)
- [Discuss] [BLU/Officers] update instructions for key signing
- From: dsr at randomstring.org (Dan Ritter)
- [Discuss] [BLU/Officers] update instructions for key signing
- Prev by Date: [Discuss] New document on Unbound caching DNS server
- Next by Date: [Discuss] [BLU/Officers] update instructions for key signing
- Previous by thread: [Discuss] [BLU/Officers] update instructions for key signing
- Next by thread: [Discuss] [BLU/Officers] update instructions for key signing
- Index(es):