the more I read about this Trustico incident, the more absurd it gets
what the actual fuck
@staticsafe The CA model is irreparably broken by design.
@seanl sure but that's not my point
@staticsafe It should be noted that #Trustico ads were framing this as an advantage (green checkmark) "no need to send a CSR"
@staticsafe And, to play devil's advocate, there are probably some users that would manage their private keys even more badly than #Trustico did.
Ping @aeris @Keltounet
@staticsafe I assume when I use a provider that works through Let's Encrypt, the provider is holding on to the keys rather than Let's Encrypt. Still depends on trusting someone else, but it's not the CA.
@Riley correct, in that case, the provider uses a tool that interfaces with Let's Encrypt's ACME API, the tool generates the CSR and the private key, submits the CSR to Let's Encrypt, Let's Encrypt does the validation process and if it passes, gives the cert back
@staticsafe Good knowledge.
@staticsafe web of untrust
I fully expect Trustico to go bankrupt in short order, no CA is gonna wanna do business with them after this
@staticsafe The shell injection is the best part https://twitter.com/svblxyz/status/969220402768736258
@bortzmeyer yeah I just saw that, it continues to get worse
its called a *private* key for a reason
don't let the certificate authority generate it for you and/or give it to the certificate authority
the only thing you are supposed to give to the certificate authority is the certificate signature request (CSR) and they give you the certificate after the validation process
#infosec