Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Cloud

11/19/2014
04:10 PM
Connect Directly
Twitter
RSS
E-Mail
100%
0%

New Certification Authority To Offer Free Certs For HTTPS

The Electronic Frontier Foundation's new certificate authority aims to make getting a domain validation TLS cert so easy, you can't resist.

The process of obtaining SSL/TLS certificates is cumbersome enough to convince many domain owners that it isn't worth the trouble, but a new certificate authority (CA) seeks to change that and make it free of cost -- making the process so quick and easy that every site will be convinced to shift from "http" to "https."

The new CA, a nonprofit called Let's Encrypt, was announced yesterday by the Electronic Frontier Foundation (EFF), with plans to begin issuing free domain verification certificates as soon as June 2015. The CA is a collaborative effort of researchers and developers at the EFF, Mozilla, and the University of Michigan, with support from Cisco, Akamai, and Identrust.

Back in 2012, Josh Aas and Eric Rescorla, co-workers at Mozilla, were discussing ideas for widely increasing the use of SSL/TLS online. "Everything was really hard," says Aas, "unless you owned the CA."

They brought their idea for a new CA to their employers at Mozilla, who agreed to support them as their first major sponsor. In 2013, they created the Internet Security Research Group (ISRG), which will operate the new CA. Aas is currently its executive director. They then learned that the EFF was working on similar plans and decided to team up.

The usual process for obtaining an SSL or TLS cert takes between one and three hours, according to the EFF. Let's Encrypt reduces this time to 20-30 seconds. You don't even need to visit the Let's Encrypt website to get it.

Such speed requires a high degree of automation, so the researchers created ACME, a new protocol for obtaining and managing certificates. However, that automation limits what sort of verification they can do. So Let's Encrypt will only be able to issue domain validation certs -- you'll have to go elsewhere for extended validation.

At the moment, Let's Encrypt does not have a root certificate developed or accepted by browsers. This process could take years. In the meantime, another CA, IdenTrust, has agreed to vouch for Let's Encrypt by cross-signing its root, thereby allowing people to obtain Let's Encrypt certs.

Aas says Let's Encrypt intends to start issuing certs in June 2015. "We also want more transparency about what certs are issued." Certificates can be issued with greater confidence when a CA can see what certs have been issued by other authorities. The EFF's Decentralized SSL Observatory, the University of Michigan's scans.io, and Google's Certificate Transparency logs are examples of these public cert databases, and the ISRG intends to follow suit. "We're committed to publishing every cert we issue."

Sara Peters is Senior Editor at Dark Reading and formerly the editor-in-chief of Enterprise Efficiency. Prior that she was senior editor for the Computer Security Institute, writing and speaking about virtualization, identity management, cybersecurity law, and a myriad ... View Full Bio
 

Recommended Reading:

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
GonzSTL
50%
50%
GonzSTL,
User Rank: Ninja
11/24/2014 | 8:17:34 AM
Re: New Certification Authority To Offer Free Certs For HTTPS
Perhaps I stated that too simply. I also urge them to check the certificate to verify the site appears to be legit. The point of my post was to stress that confidence can be taken advantage of due to this new development. While I do agree that consumers have to take responsibility for their security and privacy, it is becoming harder for the lay person to do so without adequate information or awareness training.
ODA155
50%
50%
ODA155,
User Rank: Ninja
11/23/2014 | 11:34:26 PM
Re: adoption
@Kelly Jackson Higgins,... "It will be really interesting to see how this takes off."... can you say Anti-Trust lawsuit... there is no way Symantec and the other big-boy CA's will let this happen.
phoenix522
50%
50%
phoenix522,
User Rank: Strategist
11/21/2014 | 5:53:09 PM
Re: New Certification Authority To Offer Free Certs For HTTPS
@GonzSTL I don't make that assumption. I tell people that if it is https, they know that nobody is snooping at the traffic because it is encrypted but they still need to know who is at the other end.
GonzSTL
50%
50%
GonzSTL,
User Rank: Ninja
11/21/2014 | 2:18:41 PM
New Certification Authority To Offer Free Certs For HTTPS
Interesting. I usually tell folks that when they perform e-commerce transactions such as buying online, to look for the "HTTPS" prefix in the URL. It gives them some sort of assurance that the site is at least legit and inspires confidence in their transaction with respect to privacy and security. Based on this new development, and if I were a bad guy, I would create a domain website with SSL or TLS certs and bank on users' expected trust behavior to distribute malware or steal credentials. After all, don't we usually trust domain validated sites that offer encryption?
Kelly Jackson Higgins
50%
50%
Kelly Jackson Higgins,
User Rank: Strategist
11/21/2014 | 1:34:56 PM
adoption
It will be really interesting to see how this takes off. If it does and gets widespread adoption, it will be a whole new generation for the Net.
COVID-19: Latest Security News & Commentary
Dark Reading Staff 8/14/2020
Lock-Pickers Face an Uncertain Future Online
Seth Rosenblatt, Contributing Writer,  8/10/2020
Hacking It as a CISO: Advice for Security Leadership
Kelly Sheridan, Staff Editor, Dark Reading,  8/10/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
7 New Cybersecurity Vulnerabilities That Could Put Your Enterprise at Risk
In this Dark Reading Tech Digest, we look at the ways security researchers and ethical hackers find critical vulnerabilities and offer insights into how you can fix them before attackers can exploit them.
Flash Poll
The Changing Face of Threat Intelligence
The Changing Face of Threat Intelligence
This special report takes a look at how enterprises are using threat intelligence, as well as emerging best practices for integrating threat intel into security operations and incident response. Download it today!
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-17475
PUBLISHED: 2020-08-14
Lack of authentication in the network relays used in MEGVII Koala 2.9.1-c3s allows attackers to grant physical access to anyone by sending packet data to UDP port 5000.
CVE-2020-0255
PUBLISHED: 2020-08-14
** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2020-10751. Reason: This candidate is a duplicate of CVE-2020-10751. Notes: All CVE users should reference CVE-2020-10751 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidenta...
CVE-2020-14353
PUBLISHED: 2020-08-14
** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2017-18270. Reason: This candidate is a duplicate of CVE-2017-18270. Notes: All CVE users should reference CVE-2017-18270 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidenta...
CVE-2020-17464
PUBLISHED: 2020-08-14
** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that it was not a security issue. Notes: none.
CVE-2020-17473
PUBLISHED: 2020-08-14
Lack of mutual authentication in ZKTeco FaceDepot 7B 1.0.213 and ZKBiosecurity Server 1.0.0_20190723 allows an attacker to obtain a long-lasting token by impersonating the server.