Why I no longer have an old-school cert on my HTTPS site
Access to the blog
- Several commenters note intermittent reachability and apparent IP or ISP blocking; some report being unable to read the site from parts of Europe.
- This leads a few to question the author’s operational choices or competence, though others say the site works fine from their regions.
ACME, Let’s Encrypt, and client complexity
- Many sympathize with distrust of large, opaque ACME clients (especially ones that run as root, edit webserver configs, or have large, hard‑to‑audit codebases).
- Others argue the protocol is reasonably designed for a genuinely hard problem and that existing clients have seen wide real‑world use without major disasters.
- A recurring theme: ACME itself is fine, but typical tooling is overcomplicated, poorly documented, or intrusive.
Tooling: certbot, acme.sh, and alternatives
- Certbot is criticized for:
- Mutating webserver configs by default.
- Being “complexity creep” and hard to reason about or hook correctly.
- Defenses of certbot note:
- Webroot and DNS plugins avoid config munging and can run unprivileged, with simple post‑hooks to reload servers.
- acme.sh receives both praise (simple dependencies, good DNS‑01 support) and criticism (8000 lines of shell, lots of open issues, controversial ZeroSSL default).
- Other small clients (dehydrated, acme_tiny, uacme, OpenBSD’s acme-client, Apache mod_md, Caddy’s built‑in ACME) are suggested for people who want minimal or integrated solutions.
- Several stress that the ACME client need not run on the webserver; a separate machine or jail can handle issuance and distribute certs.
JOSE, JWK, JSON, and cryptographic overengineering
- Some agree with the post that JOSE/JWK/JWS and ACME’s use of JSON, base64url, and nested structures are “galactically overengineered”.
- Others counter that:
- They’re still simpler than legacy ASN.1/X.509/PKCS stacks or XMLDSig.
- Complexity largely reflects real interoperability and algorithm‑support needs; most users rely on libraries rather than hand‑rolling.
- Long subthreads debate JSON’s numeric semantics, lack of strong typing, and alternatives (S‑expressions, protobuf, Dhall).
X.509, SANs, and protocol history
- Several comments explain why SANs are mandatory, how CN‑only certs broke, and how browser behavior evolved to enforce SAN usage.
- ASN.1/X.509 internals and certificate fields (issuer, validity, serials, key usage, CT SCTs) are discussed as inherently complex but mostly hidden by tooling.
Security model, HTTPS everywhere, and wildcards
- Strong consensus that plain HTTP is now effectively unsafe:
- MITM injection, tracking, and “watering hole” attacks are cited.
- Browsers mark HTTP as “not secure”, restrict APIs to HTTPS, and auto‑upgrade in many cases.
- Some still claim “no reason” for TLS on a blog; replies emphasize reader privacy, integrity, and defense‑in‑depth even for “static” content.
- DNS‑01 and wildcards:
- DNS‑01 is praised for decoupling ACME from webserver configs and enabling wildcards or internal domains.
- Critics note operational pain: fast TXT updates, propagation delays, anycast issues.
- Wildcards are seen by some as helpful for obscuring internal hostnames; others consider them a dangerous single point of compromise.
- Techniques like acme-dns or delegating _acme-challenge via NS/CNAME are suggested to isolate DNS updates.
Manual vs automated cert management; “perfect vs good”
- Some commenters echo the author’s desire to fully understand and tightly control every component touching keys, even if that means writing a bespoke client.
- Others argue this is overkill for a personal blog, and that widely used, reasonably secure automation (possibly behind a load balancer or in containers) is a better use of time.
- There’s debate over whether rolling a custom C++ ACME client is actually safer than using a well‑reviewed existing one.
PKI evolution, EV, and ACME’s inevitability
- Several note that non‑ACME cert workflows are effectively dead as certificate lifetimes shrink and automation becomes mandatory.
- Long, detailed subthreads explain why EV certificates failed in practice (UI confusion, phishers obtaining similar EV names, human‑driven verification not scaling) and how CA/Browser Forum baseline requirements and Certificate Transparency reshaped the ecosystem.
Registrars and Gandi
- The post’s aside about leaving Gandi prompts discussion of registrar choices.
- Multiple people report large Gandi price hikes and new fees since an acquisition, and describe migrating to alternatives (Porkbun, Cloudflare, Route53, small regional registrars).