certera | 5 years ago | on: Another free CA as an alternative to Let's Encrypt
certera's comments
certera | 5 years ago | on: Another free CA as an alternative to Let's Encrypt
This is where I shamelessly plug my project, Certera: https://docs.certera.io
I love LE, like really really love it. I was surprised to hear that certs were going from 2 to 1 year expiration and that made me really pause for a second to think about the lack of proper infrastructure around certificates, especially LE certs. I envision these short lived certs from LE/ZeroSSL needing some of the components that ZeroSSL mentioned above and much, much more. Eventually, if/when we have 1 week/1 day cert expirations, we'll need a certificate exchange system to better handle complex scenarios where other parties are involved (i.e. when doing client certs, SAML certs, etc.).
certera | 5 years ago | on: Chromium and Mozilla to enforce 1 year validity for TLS certificates
To elaborate on the why for alerting, there are many situations that I've seen where things change and subsequently fail silently. Perhaps some dependencies, or maybe configuration changes, caused things to break. Also, alerting doesn't only have to be for your certificates. You can point to any endpoint to monitor as well. There are three aspects of alerting: changes to the cert (perhaps you care about a 3rd party certificate and its underlying key changing), failure to renew, and expirations. Each comes with its own benefits and use cases.
To expand on the why a bit further for the project as a whole, it's really as a way to help consolidate and centralize things. I've seen many disparate ways of using Let's Encrypt. From various clients to some hacks to better support more complicated scenarios. By separating obtaining the certificate from applying, it helps facilitate many things, like using LE certs behind load balancers & proxies, non-standard ports, things that don't speak HTTP, etc.
If certificate expiration continues to decrease in time, we'll need some capabilities to exchange certificates in an automated fashion as well. I'd also like to incorporate Certificate Transparency logs so you can be sure no one has issued certs for your domain(s). There are many cool and interesting scenarios but mostly the challenges come when managing things at scale. So, it's not really all that useful if you're only managing one or two certs.
certera | 5 years ago | on: Chromium and Mozilla to enforce 1 year validity for TLS certificates
certera | 5 years ago | on: Chromium and Mozilla to enforce 1 year validity for TLS certificates
It's PKI for Let's Encrypt certificates. Helps you issue, renew, revoke certs from a central place. Also get alerts so you know when things have changed, expired, failed to renew.
While a lot of places give you certs built in, there's a whole world of places you still need certs. Like FTP, mail, behind load balancers, disparate environments and systems, etc.
In the future, I'm planning on creating a way to automate the certificate exchange process. This should help with using and exchanging certs used in client authentication and things like SAML SSO. If expiration get down to a month or less, I see a need for a system to help do all of these things and more.
certera | 5 years ago | on: Ask HN: How does your company manage its encryption keys?
You can rotate keys and facilitate key pinning scenarios.
Cheers!
certera | 5 years ago | on: Ask HN: What's your quarantine side project?
Certera aims to fill a gap in centralizing and managing LE certs and allowing those certs to be used in more places and scenarios.
certera | 5 years ago | on: Ask HN: What's your quarantine side project?
It's a central place to monitor, issue, renew, revoke your Let's Encrypt certificates.
certera | 6 years ago | on: Ask HN: How to get Bill Gates's attention?
Shouldn't we be looking at people with no symptoms? I know this is not ideal as we're likely only testing symptomatic people.
certera | 6 years ago | on: Ask HN: What are some issues with DNS?
certera | 6 years ago | on: Ask HN: What are you working on in lockdown?
certera | 6 years ago | on: New Grad vs. Senior Dev
certera | 6 years ago | on: Ask HN: What projects are you working on now?
Think of it as PKI for Let's Encrypt certificates. LE certs are great, but Certera is aiming to make it simpler, easier and more useful.
certera | 6 years ago | on: All the current trees in Barcelona
certera | 6 years ago | on: Let's Encrypt has turned on stricter validation requirements
certera | 6 years ago | on: Let's Encrypt has turned on stricter validation requirements
certera | 6 years ago | on: Microsoft Teams outage due to expired certificate
certera | 6 years ago | on: Microsoft Teams outage due to expired certificate
https://github.community/t5/GitHub-Pages/Does-GitHub-Pages-S...
Hopefully when I make some money I can move to a hosted setup where I can control it all.
certera | 6 years ago | on: Microsoft Teams outage due to expired certificate
I haven't been marketing at all, and I just recently finished the first stable release, so the jury is still out on whether this is all a good idea or not!
The docs are based on ReadTheDocs, but settled on a single file layout instead of having multiple pages.
certera | 6 years ago | on: Microsoft Teams outage due to expired certificate
Yes, and it's very simple & basic. A single CURL to get it like so: curl https://<your_certera>/api/certificate/<cert_name> \ -H "apiKey:<your_api_key>"
You can pipe that out to a file directly as it's in PEM format by default. More info here: https://docs.certera.io/#certificates-api
The thing that's unique about Certera is that it's not opinionated on your existing setup. It doesn't care whether it's Traefik, apache, nginx or IIS. The "glue" is a standard PEM file format, the way it should be. It's up to you how to tell whatever system cares about the PEM and do the "reload" of the cert.
I'm not sure how Traefik would communicate with it as I'm not familiar with Traefik in general. I'm assuming that you'd like Traefik to simply say: "gimme the cert for xyz domain" and have some endpoint/system take care of the rest, right? Don't hesitate to create an issue in GitHub and we can discuss further. Sometimes I lose track of HN comments due to a lack of notifications.