From 21034a3318d64fb35bb7e9fbf557a6cb5b9ab365 Mon Sep 17 00:00:00 2001 From: Bob Mottram Date: Tue, 28 Oct 2014 22:10:35 +0000 Subject: [PATCH] faq --- website/faq.html | 8 ++++---- 1 file changed, 4 insertions(+), 4 deletions(-) diff --git a/website/faq.html b/website/faq.html index fca1b362..bdd42850 100644 --- a/website/faq.html +++ b/website/faq.html @@ -4,7 +4,7 @@ - + @@ -463,15 +463,15 @@ Now visit your web site at https://mydomainn

Why use self-signed certificates?

-Almost everywhere on the web you will read that self-signed certificates are worthless. They bring up scary looking browser warnings and gurus will advise you not to use them. Self-signed certificates are quite useful though. What the scary warnings mean - and it would be good if they explained this more clearly - is that you have an encrypted connection established but there is no certainty about who that connection is with. The usual solution to this is to get a "real" SSL certificate from one of the certificate authorities, but it's far from clear that such authorities can be trusted. There have been various scandals involving such organisations, and it does not seem plausible to assume that they are somehow immune to the sort of treatment which Lavabit encountered. So although most internet users have been trained to look for the lock icon as an indication that the connection is secured that belief may not always be well founded. +Almost everywhere on the web you will read that self-signed certificates are worthless. They bring up scary looking browser warnings and gurus will advise you not to use them. Self-signed certificates are quite useful though. What the scary warnings mean - and it would be good if they explained this more clearly - is that you have an encrypted connection established but there is no certainty about who that connection is with. The usual solution to this is to get a "real" SSL certificate from one of the certificate authorities, but it's far from clear that such authorities can be trusted. There have been various scandals involving such organisations, and it does not seem plausible to assume that they are somehow immune to the sort of treatment which Lavabit received. So although most internet users have been trained to look for the lock icon as an indication that the connection is secured that belief may not always be well founded.

-Security of web sites on the internet is still a somewhat unsolved problem, and what we have now is a less than ideal but good enough to fool most of the people most of the time kind of arrangement. Long term a better solution might be to have a number of certificate authorities in a number of different jurisdictions vote on whether a given certificate actually belongs to a given domain name. Experimental systems like this exist, but they're not widely used. Since the current certificate system has an enormous amount of inertia behind it change could be slow in arrival. +Security of web sites on the internet is still a somewhat unsolved problem, and what we have now is a less than ideal but good enough to fool most of the people most of the time kind of arrangement. Long term a better solution might be to have a number of certificate authorities in a number of different jurisdictions vote on whether a given certificate actually belongs to a given domain name. Experimental systems like this exist, but they're not widely used. Since the current certificate system has an enormous amount of inertia behind it change could be slow in arriving.

-For now a self-signed certificate will probably in most cases protect your communications from passive surveillance. Once you've got past the scary browser warning and accepted the certificate under most conditions (except when using the Tor browser) you should not repeatedly see that warning. If you do then someone may be trying to meddle with your connection to the server. You can also take a note of the fingerprint of the certificate and check that if you are especially concerned. If the fingerprint remains the same then you're probably ok. +For now a self-signed certificate will probably in most cases protect your communications from "bulk" passive surveillance. Once you've got past the scary browser warning and accepted the certificate under most conditions (except when starting up the Tor browser) you should not repeatedly see that warning. If you do then someone may be trying to meddle with your connection to the server. You can also take a note of the fingerprint of the certificate and verify that if you are especially concerned. If the fingerprint remains the same then you're probably ok.