|
Yeah, all of this.
Although once traffic is "on the inside" I think people do tend to keep it SSL and this is probably a little bit bad/irrelevant/overkill. Encryption/decryption doesn't come for free. Let the API gateways/load balancers handle it.
My mouth stood agape at a line in Microsoft docs recently for a specific kind of containerization on Azure where they say applications don't have to and should not implement SSL. I have to think their thinking is much like the sentiment above.
However, it IS maybe a notably different animal to be able to sniff your own traffic.
|
|
|
|
|
Agreed, but remember that for DECADES our poor practices at protecting thing (Storing passwords clear text in DBs associated with the users, shoving them in COOKIES (OMG) as opposed to some GUID), and thinking we can ADD security later.
You know, like we can ADD performance Later... (Every project I've seen with that attitude suffered massive performance issues. You DESIGN for performance, you implement with care. If speed is important, then it's part of the CONTRACT and TRACING).
If Security is remotely important. It's got to be part of the contract.
And in todays world. Let's ASSUME that a LACK of security is a NON-STARTER.
The tools are getting easier/better. But people still not understanding which is the PRIVATE KEY and which is the PUBLIC KEY is getting old. (of course calling them both key files, and sometimes .key or no extension doesn't help, but the .pub should be pretty obvious).
--> We've come a VERY LONG way since the 1940s (Pre-Fortran). C, C++ (Objects), (Frameworks), and more!
I have hope!
|
|
|
|
|
You likely have a few more grey hairs than I. But I did write some Fortran... in high school.
It should be relatively easy to make something configured only for SSL work without it. It's removing complexity vs adding it. Mostly that complexity is abstracted from the developer into configuration details with libraries and frameworks handling the nitty gritty of hand shakes and certificates. In most cases, I'd guess the developer need only do configurational things and provide appropriate files. "Only"... heh.
It is the case that some recent work was approached in just that way which is why I'm aware of the contextual "no don't do SSL" from Microsoft.
Performance is a tricky thing. I don't disagree about designing with it in mind, but I might be wary of getting terribly caught up in "pre-optimization". It's maybe sometimes easier to see what needs the most grease once the machine is running.
My gut says it tends less to be that things weren't designed with performance in mind. The modern development practice of trying to reuse every wheel possible while creating as few purpose built ones as one can get away with? We had a frame, wheels, chain, gear, and pedals so we rather efficiently glue them all together in Henry Ford fashion. But then we find we are riding a 1-speed bike up a hill.
Moore's law and related meant we got way more resources than we needed and we leveraged them. Perfection took a far back seat to productivity. Regardless of where that falls on one's bad<->understandable<->good line, it does mean that a sizeable majority have never had to think very much about it at all.
|
|
|
|
|
why do we need privecy?
because years ago someone complained about someone walking around naked, they were chill with it, if you dont want to look thats on you. but nah, all the offended people got together and said, NO, privates should be covered by default we making some laws about it, then everyone like ok and followed along.
Its more the 1 person that was taking pictures of other naked people in public, which if they didnt go and share it out with everone else, probably would have been an issue, but they did, and complaints were made.
the real annoying part is when its your own local home and its still like no, you gotta go extra steps if want to be un clothed here. but I own this, I know this place, its okay. No your password for localhost appears on a leak list, imma be dumb and not filter out admin admin for localhost
|
|
|
|
|
Maze,
You are clearly missing the point.
Did you know the IRS has a rule that they can use ILLEGALLY Obtained information against you?
I used to be you! (Since I don't break the law, what do I care!)
Here is the simplest example. Given JUST the data the government admits it collects from Cellphone data...
I can geofence rich neighborhoods, and houses, and EXPENSIVE hotels nearby. I can now calculate who is having affairs.
Where they live, who they are having the affair with. Where both people work and live. In Bulk, in MINUTES.
Now, I knock on your door, and I confront you, and suggest your wife need not know, if you DONATE a reasonable sum to my political campaign, or whatever. (Having an affair is NOT ILLEGAL). Being extorted is. But you are powerless. BTW, they know enough to destroy your career. (FWIW, I've seen this very tactic, and years long legal fees sponsored by our own government used).
How about framing you for a crime you did not commit. But they used your cellphone data (In advance of trumping up the charges to put you in the area, where they knew you had no alibi).
This data can be used to solve crimes, or to implicate people. Our constitution is SUPPOSED to protect us.
It does not! Because they don't have to WIN the lawsuit. The person I know, did NOT lose the case. But they lost MILLIONS and had to step down from their position.
And how about CA... They "accidentally" published FULL ID information on all concealed carry people (I think in one county). Addresses, DOBs, License #s, and type of weapon.
Think LONG AND HARD... Would you be comfortable knowing that ALL of the information about you, that is stored on your computer, in your emails, including Bank Account #s, ids, ssn, etc. Were available for sale? Along with your Cell Phone data?
|
|
|
|
|
I'm annoyed by Linux for similar reasons. It's a lot of hacks on hacks, a lot of accepting the status quo as how things must be instead of taking a huge step back & re-evaluating whether the present behavior really is the best platform to build the future upon.
However, do you really have to deal with it every 90 days yourself? Meaning, can't you schedule that stuff (assuming there's no more troubleshooting involved)?
|
|
|
|
|
I can probably automate it now that it's fixed but I am concerned about the issues that I had to troubleshoot or similar cropping up again and maybe blowing up my site when I'm not around, so my other plan was to maybe have it send me mail just before I need to renew but I don't have qmail installed or anything like that.
I have other issues currently that are making demands on my time so I haven't fiddled with it. I figure I have about 80 days to come up with something.
To err is human. Fortune favors the monsters.
|
|
|
|
|
I find your experience very weird. Especially since you think everything needs to be unbound from http port before you can use certbot. The whole *point* of certbot is that it checks to see if the machine it is running on is the machine that it can reach a http site at... Therefore, they know who it is that requested the certificate.
FWIW, I have a bit of trouble with certbot because my default firewall configuration blocks http to internet, so I have to whitelist the port, run certbot, and unwhitelist every three months. Takes literally 5 seconds. I don't know what you're doing, but "it works on my machine"!
BTW, please don't blame Linux for what is clearly a certbot problem. Remember, Linux is fragmented, so there are many many good softwares and designs that you use on Linux constantly without realizing, and only a few that are bad. It's not all one giant corporation putting out completely bad stuff.... or updating constantly to provide new icon sets.
|
|
|
|
|
i will blame linux for having to %$#*)@ around with systemd far more than i ever should have to fix the problem.
To err is human. Fortune favors the monsters.
|
|
|
|
|
I had similar setup with certbot nginx and several services spanning 3 machines.
There are some hickups from time to time but mostly it works. Surprisingly because it is not like I am linux admin.
No more Mister Nice Guy... >: |
|
|
|
|
|
It is a principle in cryptography that only encrypting 'what is important' just tells adversaries what to focus on. It gives them valuable information that they would not otherwise have, and the last thing you want to give adversaries is any information.
Cheers,
Russ
|
|
|
|
|
Agreed. Linux is a POS based on something which was cool in 1968. However, I don't have a beard down to my balls, and I don't wear sandals, so...
|
|
|
|
|
Just wondering how/if this is a linux specific problem, and not just a certbot problem (or something else)? Would the same [equivalent] steps have worked any better on Windows?
Pictures of error messages, please "or it didn't happen ™".
Its been awhile, but I think I has a horrible experience with the certbot script and just set it up manually (using instructions similar to, if not the same as: https://ivopetkov.com/b/let-s-encrypt-on-ec2/, and never looked back. However, the referenced github repo doesn't seem to exist as-such anymore (and redirects to the certbot repo). But that does still includes the letsencrypt-auto script (for now).
|
|
|
|
|
It was the other day, and I've long since closed that session. I'm really not up to digging through my logs right now, especially since the problem has been resolved, at least for now.
To err is human. Fortune favors the monsters.
|
|
|
|
|
Not entirely sure this is the same kind of cert you're talking about, but have you looked into free SSL through Cloudflare? Automatic and zero work. Although, IINM, the free version is only SSL at the edge servers where everything is (eventually) cached, not SSL all the way to the host, unless you set it up that way. Edge node is fine for a lot of things.
|
|
|
|
|
Thanks, I'll look into that.
To err is human. Fortune favors the monsters.
|
|
|
|
|
|
I have a small Win32 app demo to show some algorithms on drawing 2D geometry.
I plan to convert or rewrite it in C# because I like to use this algorithm in my WinForm app.
any tips to share? it seems a little daunting to me...
diligent hands rule....
|
|
|
|
|
I guess (I'm not an expert) going from Win32 to Windows Forms is far easier than the opposite.
GDI+ is rather user-friendly, in my opinion.
"In testa che avete, Signor di Ceprano?"
-- Rigoletto
|
|
|
|
|
I second you.
C++ GDI+ and C# GDI+ are very similar, one-to-one function replacement. I ported my Outline Text from C++ to C# in one day.
|
|
|
|
|
My tip: do not.
"If we don't change direction, we'll end up where we're going"
|
|
|
|
|
I concur. If you must redo this demo as a C# application, write it from the ground up in C#. You'll end up with a more efficient application than if you do a straight conversion.
|
|
|
|
|
yes, I plan to go through the code and understand the logic, then rewrite it...
diligent hands rule....
|
|
|
|
|
What's it written in now?
Or, do you wish this to be a web app and hence C#?
|
|
|
|
|
Win32, written in C++. would like to convert it into C# WinApp to play around with the algorithms in it,,,
diligent hands rule....
|
|
|
|
|