Let's Not Encrypt (2019)

Tone of the article and irony

  • Many readers see the piece as perfectionist, contrarian, or borderline satire; others think it raises valid concerns about WebPKI, not about encryption itself.
  • The author’s later adoption of a Let’s Encrypt (LE) cert is noted as ironic and evidence that browser and ecosystem pressure make plain HTTP practically untenable.

Why “encrypt everything” became the norm

  • Commenters recall widespread pre-HTTPS abuse: ISPs injecting ads and banners into HTTP pages (including on paid business lines and metro Wi‑Fi), toolbar/AV software rewriting pages or even leaking banking sessions, and trivial session hijacking on public Wi‑Fi.
  • Several argue that without near‑universal TLS, ISPs and other intermediaries would still be routinely tampering with traffic, and mass surveillance would be easier.

Critiques of Let’s Encrypt and WebPKI

  • Core criticism repeated: if an attacker can MITM the ACME validation (HTTP‑01 or DNS‑01), they can get their own cert, so LE “doesn’t stop” that class of MITM.
  • Others add that DV certs authenticate only domain control, not real‑world identity; scammers can and do get valid certs, undermining the “identity” story.
  • Some worry about ecosystem fragility: constant TLS deprecations, short lifetimes, and browser policies break older devices (e.g., iDRAC/iLO), forcing use of outdated browsers.
  • Concerns also raised about concentration of power: CAs and browser vendors (esp. Google) effectively decide who is trusted; LE is funded mainly by large corporations.

Defenses of Let’s Encrypt and modern PKI

  • Multiple replies say the article gets facts wrong or omits context:
    • HTTP still loads in modern browsers (with “Not secure” indicators); only some domains (e.g., HSTS‑preload) must be HTTPS.
    • ACME challenges can be DNS‑based; certbot need not run as root; many stacks integrate ACME safely.
  • Attack model: MITM’ing a random café user is easy; MITM’ing LE from multiple global validation points is far harder, often requiring state‑level capability.
  • Certificate Transparency, CAA records, multi‑perspective validation, and short‑lived certs are cited as making mis‑issuance detectable and raising the cost of abuse.

Alternatives: self‑signed, TOFU, DNSSEC, DANE, SSH‑style

  • Some advocate trust‑on‑first‑use (SSH‑style pinning), self‑signed certs, or DNSSEC/DANE as simpler or less centralized.
  • Pushback: TOFU fails if the first connection is MITM’d; average users cannot safely compare fingerprints; DNSSEC is itself PKI with deployment and governance issues.
  • There is broad agreement that real‑world identity remains weakly solved, and that encryption and identity probably should be decoupled conceptually.

Operational trade‑offs

  • Short‑lived, automated certificates feel like “time bombs” to some, especially for small static sites that change rarely.
  • Others argue frequent automated renewal is safer than long manual renewals: failures surface quickly, processes are continuously exercised, and revocation/OCSP issues are eased.