this post was submitted on 20 Oct 2023
118 points (96.8% liked)

Selfhosted

40183 readers
497 users here now

A place to share alternatives to popular online services that can be self-hosted without giving up privacy or locking you into a service you don't control.

Rules:

  1. Be civil: we're here to support and learn from one another. Insults won't be tolerated. Flame wars are frowned upon.

  2. No spam posting.

  3. Posts have to be centered around self-hosting. There are other communities for discussing hardware or home computing. If it's not obvious why your post topic revolves around selfhosting, please include details to make it clear.

  4. Don't duplicate the full text of your blog or github here. Just post the link for folks to click.

  5. Submission headline should match the article title (don’t cherry-pick information from the title to fit your agenda).

  6. No trolling.

Resources:

Any issues on the community? Report it using the report flag.

Questions? DM the mods!

founded 1 year ago
MODERATORS
 

cross-posted from: https://lemmy.one/post/5660007

Likely under the command of law enforcement and without informing any clients.

all 10 comments
sorted by: hot top controversial new old
[–] [email protected] 36 points 1 year ago

This is why self hosted to me means actually running it on my own hardware in a location I have at least some control of physical access.

That said, an ISP could perform the same attack on a server hosted in your home using the HTTP-01 ACME challenge, so really no one is safe.

HSTS+certificate pinning, and monitoring new certificates issued for your domains using Certificate Transparency (crt.sh can be used to view these logs) is probably the only way to catch this kind of thing.

[–] [email protected] 12 points 1 year ago (2 children)

Good suggestions at the bottom.

There are several indications which could be used to discover the attack from day 1:

All issued SSL/TLS certificates are subject to certificate transparency. It is worth configuring certificate transparency monitoring, such as Cert Spotter (source on github), which will notify you by email of new certificates issued for your domain names

Limit validation methods and set exact account identifier which could issue new certificates with Certification Authority Authorization (CAA) Record Extensions for Account URI and Automatic Certificate Management Environment (ACME) Method Binding (RFC 8657) to prevent certificate issue for your domain using other certificate authorities, ACME accounts or validation methods

[–] [email protected] 1 points 1 year ago

so per wikipedia and confirmed at MDN, firefox is the only major browser line not to consider certificate transparency at all. and yet it's the only one that has given me occasional maddening SSL errors that have blocked site access (not always little sites, it's happened with amazon).

i don't understand how firefox can be simultaneously the least picky about certificates and the most likely to spuriously decide they're invalid.

[–] [email protected] 10 points 1 year ago
[–] [email protected] 7 points 1 year ago

Post title is missing Linode.

[–] [email protected] 6 points 1 year ago

Yes. All hosting providers will comply with requests from law enforcement.

Signal and proton mail were forced to hand out information as well in the past. All you can do is choose which provider you distrust the least.

[–] [email protected] 2 points 1 year ago* (last edited 1 year ago)

Acronyms, initialisms, abbreviations, contractions, and other phrases which expand to something larger, that I've seen in this thread:

Fewer Letters More Letters
HTTP Hypertext Transfer Protocol, the Web
SSL Secure Sockets Layer, for transparent encryption
TLS Transport Layer Security, supersedes SSL

[Thread #232 for this sub, first seen 22nd Oct 2023, 23:05] [FAQ] [Full list] [Contact] [Source code]

[–] [email protected] 1 points 1 year ago

Is it tame for selfhosted to switch to DANE?

[–] [email protected] 1 points 1 year ago

My domain has two certs issued to it. Am I in trouble?