<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
  <channel>
    <title>Let&#39;s Encrypt - Free SSL/TLS Certificates</title>
    <description>Let&amp;rsquo;s&amp;nbsp;Encrypt is a free, automated, and open certificate authority brought to you by the non-profit Internet Security Research Group (ISRG).
</description>
    <link>https://letsencrypt.org//</link>
    <atom:link href="https://letsencrypt.org//feed.xml" rel="self" type="application/rss+xml" />
    <pubDate>Thu, 09 Jun 2016 18:07:27 -0700</pubDate>
    <lastBuildDate>Thu, 09 Jun 2016 18:07:27 -0700</lastBuildDate>
    <generator>Jekyll v3.1.2</generator>
    
      <item>
        <title>Leaving Beta, New Sponsors</title>
        <description>&lt;p&gt;Let’s Encrypt is leaving beta today. We’re also excited to announce that founding sponsors &lt;a href=&quot;https://www.cisco.com/&quot;&gt;Cisco&lt;/a&gt; and &lt;a href=&quot;https://www.akamai.com/&quot;&gt;Akamai&lt;/a&gt; have renewed their Platinum sponsorships with 3-year commitments, &lt;a href=&quot;http://www.gemalto.com/&quot;&gt;Gemalto&lt;/a&gt; is joining as our newest Gold sponsor, and &lt;a href=&quot;https://www.hpe.com/&quot;&gt;HP Enterprise&lt;/a&gt;, &lt;a href=&quot;https://www.fastly.com/&quot;&gt;Fastly&lt;/a&gt;, &lt;a href=&quot;https://www.dudamobile.com/&quot;&gt;Duda&lt;/a&gt; and &lt;a href=&quot;http://www.reliablesite.net/&quot;&gt;ReliableSite.net&lt;/a&gt; are our newest Silver sponsors.&lt;/p&gt;

&lt;p&gt;Since our beta began in September 2015 we’ve issued more than 1.7 million certificates for more than 3.8 million websites. We’ve gained tremendous operational experience and confidence in our systems. The beta label is simply not necessary any more.&lt;/p&gt;

&lt;center&gt;&lt;img src=&quot;/images/Issuance-April-10-2016.png&quot; alt=&quot;Issuance as of April 10, 2016&quot; style=&quot;width: 650px; margin-bottom: 17px;&quot; /&gt;&lt;/center&gt;

&lt;p&gt;We set out to encrypt 100% of the Web. We’re excited to be off to a strong start, and with so much support across the industry.&lt;/p&gt;

&lt;p&gt;“From the very beginning, Akamai has been committed to supporting Let’s Encrypt’s vision of enabling greater use of SSL/TLS across the internet,” says Stephen Ludin, Chief Architect at Akamai. “This milestone is confirmation of Let’s Encrypt’s ability to execute on that vision and have a tremendous impact to the Internet ecosystem.”&lt;/p&gt;

&lt;p&gt;“Cisco is committed to improving the security of the Internet, not only for our customers and partners, but for everyone else as well,” says David Ward, CTO of Engineering and Chief Architect at Cisco. “Let’s Encrypt has been doing impressive work toward that goal. Our support of this community towards real-time, on-demand certificates will make the Internet more secure.”&lt;/p&gt;

&lt;p&gt;“We’re very proud to be a Gold Sponsor for Let’s Encrypt which leverages our industry-leading hardware security modules to protect their certificate authority system,” says Todd Moore, Vice President of Encryption Product Management at Gemalto. “Encryption by default is critical to privacy and security, and by working with Let’s Encrypt Gemalto is helping to deliver trust for the digital services that billions of people use every day.”&lt;/p&gt;

&lt;p&gt;Let’s Encrypt depends on industry and community support. Please consider &lt;a href=&quot;https://letsencrypt.org/getinvolved/&quot;&gt;getting involved&lt;/a&gt;, and if your company or organization would like to sponsor Let’s Encrypt please email us at &lt;a href=&quot;&amp;#109;&amp;#097;&amp;#105;&amp;#108;&amp;#116;&amp;#111;:&amp;#115;&amp;#112;&amp;#111;&amp;#110;&amp;#115;&amp;#111;&amp;#114;&amp;#064;&amp;#108;&amp;#101;&amp;#116;&amp;#115;&amp;#101;&amp;#110;&amp;#099;&amp;#114;&amp;#121;&amp;#112;&amp;#116;&amp;#046;&amp;#111;&amp;#114;&amp;#103;&quot;&gt;&amp;#115;&amp;#112;&amp;#111;&amp;#110;&amp;#115;&amp;#111;&amp;#114;&amp;#064;&amp;#108;&amp;#101;&amp;#116;&amp;#115;&amp;#101;&amp;#110;&amp;#099;&amp;#114;&amp;#121;&amp;#112;&amp;#116;&amp;#046;&amp;#111;&amp;#114;&amp;#103;&lt;/a&gt;.&lt;/p&gt;
</description>
        <pubDate>Tue, 12 Apr 2016 00:00:00 -0700</pubDate>
        <link>https://letsencrypt.org//2016/04/12/leaving-beta-new-sponsors.html</link>
        <guid isPermaLink="true">https://letsencrypt.org//2016/04/12/leaving-beta-new-sponsors.html</guid>
        
        
      </item>
    
      <item>
        <title>ISRG Legal Transparency Report, July 2015 - December 2015</title>
        <description>&lt;p&gt;The trust of our users is ISRG’s most critical asset. Transparency regarding legal requests is an important part of making sure our users can trust us, and to that end we will be publishing reports twice annually. Reports will be published three months after the period covered in order to allow us time to research all requests and orders received during the period.&lt;/p&gt;

&lt;p&gt;&lt;a href=&quot;/documents/ISRG-Legal-Transparency-Report-April-1-2016.pdf&quot;&gt;Download Legal Transparency Report, July 2015 - December 2015&lt;/a&gt;&lt;/p&gt;
</description>
        <pubDate>Fri, 01 Apr 2016 00:00:00 -0700</pubDate>
        <link>https://letsencrypt.org//2016/04/01/legal-transparency-report.html</link>
        <guid isPermaLink="true">https://letsencrypt.org//2016/04/01/legal-transparency-report.html</guid>
        
        
      </item>
    
      <item>
        <title>New Name, New Home for the Let&#39;s Encrypt Client Software</title>
        <description>&lt;p&gt;&lt;em&gt;Update: Added clarification that only the Let’s Encrypt client software is changing its name and host. The Let’s Encrypt certificate authority and associated services are not changing names or relocating.&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;Over the next few months the Let’s Encrypt client software will transition to a new name, soon to be announced, and a new home at the &lt;a href=&quot;https://www.eff.org/&quot;&gt;Electronic Frontier Foundation (EFF)&lt;/a&gt;.&lt;/p&gt;

&lt;p&gt;This change does not affect the Let’s Encrypt certificate authority (CA) or associated services, which will retain the Let’s Encrypt name and continue to be hosted by the &lt;a href=&quot;https://letsencrypt.org/isrg/&quot;&gt;Internet Security Research Group&lt;/a&gt;.&lt;/p&gt;

&lt;p&gt;The goal of Let’s Encrypt is to make turning on HTTPS as easy as possible. To accomplish that, it’s not enough to fully automate certificate issuance on the certificate authority (CA) side - we have to fully automate on the client side as well. The Let’s Encrypt client is now being used by hundreds of thousands of websites and we expect it to continue to be a popular choice for sites that are run from a single server or VPS.&lt;/p&gt;

&lt;p&gt;That said, the web server ecosystem is complex, and it would be impossible for any particular client to serve everyone well. As a result, the Let’s Encrypt community has created dozens of clients to meet many diverse needs. Moving forward, we feel it would be best for Let’s Encrypt to focus on promoting a generally healthy client and protocol ecosystem and for our client to move to the EFF. This will also allow us to focus our engineering efforts on running a reliable and rapidly growing CA server infrastructure.&lt;/p&gt;

&lt;p&gt;The Let’s Encrypt client goes further than most other clients in terms of end-to-end automation and extensibility, both getting certificates and in many cases installing them. This is an important strategy since major servers don’t yet have built-in support, and we want to make sure it’s given a proper chance to thrive. The EFF has led development of the Let’s Encrypt client from the beginning, and they are well-qualified to continue pursuing this strategy.&lt;/p&gt;

&lt;p&gt;The rename is happening for reasons that go beyond the move to the EFF. One additional reason for the rename is that we want the client to be distributable and customisable without having to create a complex process for deciding whether customized variants are appropriate for use with Let’s Encrypt trademarks. Another reason is that we want it to be clear that the client can work with any ACME-enabled CA in the future, not just Let’s Encrypt.&lt;/p&gt;

&lt;p&gt;We expect the client to do well at the EFF and continue to be used by many people to get certificates from Let’s Encrypt.&lt;/p&gt;
</description>
        <pubDate>Wed, 09 Mar 2016 05:00:00 -0800</pubDate>
        <link>https://letsencrypt.org//2016/03/09/le-client-new-home.html</link>
        <guid isPermaLink="true">https://letsencrypt.org//2016/03/09/le-client-new-home.html</guid>
        
        
      </item>
    
      <item>
        <title>Our Millionth Certificate</title>
        <description>&lt;p&gt;Let’s Encrypt has issued its millionth certificate. Our first million certificates are helping to secure approximately 2.4 million domains. This milestone means a lot to a team that started building a CA from scratch 16 months ago with an aim to have a real impact on the security of the Web as soon as possible.&lt;/p&gt;

&lt;p&gt;We want to see HTTPS become the default on the Web, and today’s occasion gives us confidence that we’re going to get there - much faster than even we predicted. We’re growing at a current rate of more than 100,000 certificates per week and don’t see this slowing down anytime soon. This is &lt;em&gt;dramatic and very rapid change&lt;/em&gt; for the Web.&lt;/p&gt;

&lt;p&gt;Our rapid growth is due to strong demand for an easy-to-use, low-cost, widely trusted, and truly global solution for certificate issuance and management. We also received a considerable boost from industry endorsement, with major hosting companies like OVH, Wordpress.com, Gandi, Dreamhost, and Digital Ocean helping many sites move to HTTPS with Let’s Encrypt.&lt;/p&gt;

&lt;p&gt;HTTPS has been around for a long time but according to Firefox telemetry only ~40% of websites and ~65% of transactions used HTTPS at the end of 2015. Those numbers should both be 100% if the Web is to provide the level of privacy and security that people expect, and Let’s Encrypt is going to lead the way.&lt;/p&gt;

&lt;p&gt;Let’s Encrypt depends on support from a wide variety of individuals and organizations. Please consider &lt;a href=&quot;https://letsencrypt.org/getinvolved/&quot;&gt;getting involved&lt;/a&gt;, and if your company or organization would like to sponsor Let’s Encrypt please email us at &lt;a href=&quot;&amp;#109;&amp;#097;&amp;#105;&amp;#108;&amp;#116;&amp;#111;:&amp;#115;&amp;#112;&amp;#111;&amp;#110;&amp;#115;&amp;#111;&amp;#114;&amp;#064;&amp;#108;&amp;#101;&amp;#116;&amp;#115;&amp;#101;&amp;#110;&amp;#099;&amp;#114;&amp;#121;&amp;#112;&amp;#116;&amp;#046;&amp;#111;&amp;#114;&amp;#103;&quot;&gt;&amp;#115;&amp;#112;&amp;#111;&amp;#110;&amp;#115;&amp;#111;&amp;#114;&amp;#064;&amp;#108;&amp;#101;&amp;#116;&amp;#115;&amp;#101;&amp;#110;&amp;#099;&amp;#114;&amp;#121;&amp;#112;&amp;#116;&amp;#046;&amp;#111;&amp;#114;&amp;#103;&lt;/a&gt;.&lt;/p&gt;
</description>
        <pubDate>Tue, 08 Mar 2016 04:00:00 -0800</pubDate>
        <link>https://letsencrypt.org//2016/03/08/our-millionth-cert.html</link>
        <guid isPermaLink="true">https://letsencrypt.org//2016/03/08/our-millionth-cert.html</guid>
        
        
      </item>
    
      <item>
        <title>OVH Sponsors Let&#39;s Encrypt</title>
        <description>&lt;p&gt;We’re pleased to announce that &lt;a href=&quot;https://www.ovh.com/&quot;&gt;OVH&lt;/a&gt; has become a Platinum sponsor of Let’s Encrypt.&lt;/p&gt;

&lt;p&gt;According to OVH CTO and Founder Octave Klaba, “OVH is delighted to become a Platinum sponsor. With Let’s Encrypt, OVH will be able to set a new standard for security by offering end-to-end encrypted communications by default to all its communities.”&lt;/p&gt;

&lt;p&gt;The Web is an increasingly integral part of our daily lives, and encryption by default is critical in order to provide the degree of security and privacy that people expect. Let’s Encrypt’s mission is to encrypt the Web and our sponsors make pursuing that mission possible.&lt;/p&gt;

&lt;p&gt;OVH’s sponsorship will help us to pay for staff and other operation costs in 2016.&lt;/p&gt;

&lt;p&gt;If your company or organization would like to sponsor Let’s Encrypt, please email us at &lt;a href=&quot;&amp;#109;&amp;#097;&amp;#105;&amp;#108;&amp;#116;&amp;#111;:&amp;#115;&amp;#112;&amp;#111;&amp;#110;&amp;#115;&amp;#111;&amp;#114;&amp;#064;&amp;#108;&amp;#101;&amp;#116;&amp;#115;&amp;#101;&amp;#110;&amp;#099;&amp;#114;&amp;#121;&amp;#112;&amp;#116;&amp;#046;&amp;#111;&amp;#114;&amp;#103;&quot;&gt;&amp;#115;&amp;#112;&amp;#111;&amp;#110;&amp;#115;&amp;#111;&amp;#114;&amp;#064;&amp;#108;&amp;#101;&amp;#116;&amp;#115;&amp;#101;&amp;#110;&amp;#099;&amp;#114;&amp;#121;&amp;#112;&amp;#116;&amp;#046;&amp;#111;&amp;#114;&amp;#103;&lt;/a&gt;.&lt;/p&gt;
</description>
        <pubDate>Mon, 21 Dec 2015 09:00:00 -0800</pubDate>
        <link>https://letsencrypt.org//2015/12/21/ovh-sponsorship.html</link>
        <guid isPermaLink="true">https://letsencrypt.org//2015/12/21/ovh-sponsorship.html</guid>
        
        
      </item>
    
      <item>
        <title>Entering Public Beta</title>
        <description>&lt;p&gt;We’re happy to announce that Let’s Encrypt has entered Public Beta. Invitations are no longer needed in order to get free certificates from Let’s Encrypt.&lt;/p&gt;

&lt;p&gt;It’s time for the Web to take a big step forward in terms of security and privacy. We want to see HTTPS become the default. Let’s Encrypt was built to enable that by making it as easy as possible to get and manage certificates.&lt;/p&gt;

&lt;p&gt;We’d like to thank everyone who participated in the Limited Beta. Let’s Encrypt issued over 26,000 certificates during the Limited Beta period. This allowed us to gain valuable insight into how our systems perform, and to be confident about moving to Public Beta.&lt;/p&gt;

&lt;p&gt;We’d also like to thank all of our &lt;a href=&quot;/sponsors/&quot;&gt;sponsors&lt;/a&gt; for their support. We’re happy to have announced earlier today that &lt;a href=&quot;/2015/12/03/facebook-sponsorship.html&quot;&gt;Facebook is our newest Gold sponsor&lt;/a&gt;.&lt;/p&gt;

&lt;p&gt;We have more work to do before we’re comfortable dropping the beta label entirely, particularly on the client experience. Automation is a cornerstone of our strategy, and we need to make sure that the client works smoothly and reliably on a wide range of platforms. We’ll be monitoring feedback from users closely, and making improvements as quickly as possible.&lt;/p&gt;

&lt;p&gt;Instructions for getting a certificate with the &lt;a href=&quot;https://github.com/letsencrypt/letsencrypt&quot;&gt;Let’s Encrypt client&lt;/a&gt; can be found &lt;a href=&quot;https://letsencrypt.readthedocs.org/en/latest/&quot;&gt;here&lt;/a&gt;.&lt;/p&gt;

&lt;p&gt;&lt;a href=&quot;https://community.letsencrypt.org/&quot;&gt;Let’s Encrypt Community Support&lt;/a&gt; is an invaluable resource for our community, we strongly recommend making use of the site if you have any questions about Let’s Encrypt.&lt;/p&gt;

&lt;p&gt;Let’s Encrypt depends on support from a wide variety of individuals and organizations. Please consider &lt;a href=&quot;https://letsencrypt.org/getinvolved/&quot;&gt;getting involved&lt;/a&gt;, and if your company or organization would like to sponsor Let’s Encrypt please email us at &lt;a href=&quot;&amp;#109;&amp;#097;&amp;#105;&amp;#108;&amp;#116;&amp;#111;:&amp;#115;&amp;#112;&amp;#111;&amp;#110;&amp;#115;&amp;#111;&amp;#114;&amp;#064;&amp;#108;&amp;#101;&amp;#116;&amp;#115;&amp;#101;&amp;#110;&amp;#099;&amp;#114;&amp;#121;&amp;#112;&amp;#116;&amp;#046;&amp;#111;&amp;#114;&amp;#103;&quot;&gt;&amp;#115;&amp;#112;&amp;#111;&amp;#110;&amp;#115;&amp;#111;&amp;#114;&amp;#064;&amp;#108;&amp;#101;&amp;#116;&amp;#115;&amp;#101;&amp;#110;&amp;#099;&amp;#114;&amp;#121;&amp;#112;&amp;#116;&amp;#046;&amp;#111;&amp;#114;&amp;#103;&lt;/a&gt;.&lt;/p&gt;
</description>
        <pubDate>Thu, 03 Dec 2015 10:00:00 -0800</pubDate>
        <link>https://letsencrypt.org//2015/12/03/entering-public-beta.html</link>
        <guid isPermaLink="true">https://letsencrypt.org//2015/12/03/entering-public-beta.html</guid>
        
        
      </item>
    
      <item>
        <title>Facebook Sponsors Let&#39;s Encrypt</title>
        <description>&lt;p&gt;We’re happy to share today that &lt;a href=&quot;https://www.facebook.com/&quot;&gt;Facebook&lt;/a&gt; is the newest &lt;a href=&quot;/sponsors/&quot;&gt;Gold sponsor&lt;/a&gt; of Let’s Encrypt. Facebook has taken multiple important steps to support and advance encryption this year, and we are glad to see Let’s Encrypt as the latest example.&lt;/p&gt;

&lt;p&gt;According to Alex Stamos, Chief Security Officer at Facebook, “Making it easier for websites to deploy HTTPS encryption is an important step in improving the security of the whole internet, and Facebook is proud to support this effort.”&lt;/p&gt;

&lt;p&gt;Facebook’s sponsorship will help us produce a greater impact as we open up our public beta today and usher in more participants over the coming months.&lt;/p&gt;

&lt;p&gt;If your company or organization would like to sponsor Let’s Encrypt, please email us at &lt;a href=&quot;&amp;#109;&amp;#097;&amp;#105;&amp;#108;&amp;#116;&amp;#111;:&amp;#115;&amp;#112;&amp;#111;&amp;#110;&amp;#115;&amp;#111;&amp;#114;&amp;#064;&amp;#108;&amp;#101;&amp;#116;&amp;#115;&amp;#101;&amp;#110;&amp;#099;&amp;#114;&amp;#121;&amp;#112;&amp;#116;&amp;#046;&amp;#111;&amp;#114;&amp;#103;&quot;&gt;&amp;#115;&amp;#112;&amp;#111;&amp;#110;&amp;#115;&amp;#111;&amp;#114;&amp;#064;&amp;#108;&amp;#101;&amp;#116;&amp;#115;&amp;#101;&amp;#110;&amp;#099;&amp;#114;&amp;#121;&amp;#112;&amp;#116;&amp;#046;&amp;#111;&amp;#114;&amp;#103;&lt;/a&gt;.&lt;/p&gt;
</description>
        <pubDate>Thu, 03 Dec 2015 09:00:00 -0800</pubDate>
        <link>https://letsencrypt.org//2015/12/03/facebook-sponsorship.html</link>
        <guid isPermaLink="true">https://letsencrypt.org//2015/12/03/facebook-sponsorship.html</guid>
        
        
      </item>
    
      <item>
        <title>Public Beta: December 3, 2015</title>
        <description>&lt;p&gt;Let’s Encrypt will enter Public Beta on December 3, 2015. Once we’ve entered Public Beta our systems will be open to anyone who would like to request a certificate. There will no longer be a requirement to &lt;a href=&quot;https://t.co/C6Q3dPYorp&quot;&gt;sign up&lt;/a&gt; and wait for an invitation.&lt;/p&gt;

&lt;p&gt;Our Limited Beta started on September 12, 2015. We’ve issued over 11,000 certificates since then, and this operational experience has given us confidence that our systems are ready for an open Public Beta.&lt;/p&gt;

&lt;p&gt;It’s time for the Web to take a big step forward in terms of security and privacy. We want to see HTTPS become the default. Let’s Encrypt was built to enable that by making it as easy as possible to get and manage certificates.&lt;/p&gt;

&lt;p&gt;We have more work to do before we’re comfortable dropping the beta label entirely, particularly on the client experience. Automation is a cornerstone of our strategy, and we need to make sure that the client works smoothly and reliably on a wide range of platforms. We’ll be monitoring feedback from users closely, and making improvements as quickly as possible.&lt;/p&gt;

&lt;p&gt;Let’s Encrypt depends on support from a wide variety of individuals and organizations. Please consider &lt;a href=&quot;https://letsencrypt.org/getinvolved/&quot;&gt;getting involved&lt;/a&gt;, and if your company or organization would like to sponsor Let’s Encrypt please email us at &lt;a href=&quot;&amp;#109;&amp;#097;&amp;#105;&amp;#108;&amp;#116;&amp;#111;:&amp;#115;&amp;#112;&amp;#111;&amp;#110;&amp;#115;&amp;#111;&amp;#114;&amp;#064;&amp;#108;&amp;#101;&amp;#116;&amp;#115;&amp;#101;&amp;#110;&amp;#099;&amp;#114;&amp;#121;&amp;#112;&amp;#116;&amp;#046;&amp;#111;&amp;#114;&amp;#103;&quot;&gt;&amp;#115;&amp;#112;&amp;#111;&amp;#110;&amp;#115;&amp;#111;&amp;#114;&amp;#064;&amp;#108;&amp;#101;&amp;#116;&amp;#115;&amp;#101;&amp;#110;&amp;#099;&amp;#114;&amp;#121;&amp;#112;&amp;#116;&amp;#046;&amp;#111;&amp;#114;&amp;#103;&lt;/a&gt;.&lt;/p&gt;
</description>
        <pubDate>Thu, 12 Nov 2015 07:00:00 -0800</pubDate>
        <link>https://letsencrypt.org//2015/11/12/public-beta-timing.html</link>
        <guid isPermaLink="true">https://letsencrypt.org//2015/11/12/public-beta-timing.html</guid>
        
        
      </item>
    
      <item>
        <title>Why ninety-day lifetimes for certificates?</title>
        <description>&lt;p&gt;We’re sometimes asked why we only offer certificates with ninety-day lifetimes. People who ask this are usually concerned that ninety days is too short and wish we would offer certificates lasting a year or more, like some other CAs do.&lt;/p&gt;

&lt;p&gt;Ninety days is nothing new on the Web. According to Firefox Telemetry, 29% of TLS transactions use ninety-day certificates. That’s more than any other lifetime.  From our perspective, there are two primary advantages to such short certificate lifetimes:&lt;/p&gt;

&lt;ol&gt;
  &lt;li&gt;They limit damage from key compromise and mis-issuance. Stolen keys and mis-issued certificates are valid for a shorter period of time.&lt;/li&gt;
  &lt;li&gt;They encourage automation, which is absolutely essential for ease-of-use. If we’re going to move the entire Web to HTTPS, we can’t continue to expect system administrators to manually handle renewals. Once issuance and renewal are automated, shorter lifetimes won’t be any less convenience than longer ones.&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;For these reasons, we do not offer certificates with lifetimes longer than ninety days. We realize that our service is young, and that automation is new to many subscribers, so we chose a lifetime that allows plenty of time for manual renewal if necessary. We recommend that subscribers renew every sixty days. Once automated renewal tools are widely deployed and working well, we may consider even shorter lifetimes.&lt;/p&gt;
</description>
        <pubDate>Mon, 09 Nov 2015 07:00:00 -0800</pubDate>
        <link>https://letsencrypt.org//2015/11/09/why-90-days.html</link>
        <guid isPermaLink="true">https://letsencrypt.org//2015/11/09/why-90-days.html</guid>
        
        
      </item>
    
      <item>
        <title>The CA&#39;s Role in Fighting Phishing and Malware</title>
        <description>&lt;p&gt;Since we announced Let’s Encrypt we’ve often been asked how we’ll ensure that we don’t issue certificates for phishing and malware sites. The concern most commonly expressed is that having valid HTTPS certificates helps these sites look more legitimate, making people more likely to trust them.&lt;/p&gt;

&lt;p&gt;Deciding what to do here has been tough. On the one hand, we don’t like these sites any more than anyone else does, and our mission is to help build a safer and more secure Web. On the other hand, we’re not sure that certificate issuance (at least for Domain Validation) is the right level on which to be policing phishing and malware sites in 2015. This post explains our thinking in order to encourage a conversation about the CA ecosystem’s role in fighting these malicious sites.&lt;/p&gt;

&lt;h1 id=&quot;cas-make-poor-content-watchdogs&quot;&gt;CAs Make Poor Content Watchdogs&lt;/h1&gt;

&lt;p&gt;Let’s Encrypt is going to be issuing Domain Validation (DV) certificates. On a technical level, a DV certificate asserts that a public key belongs to a domain – it says nothing else about a site’s content or who runs it. DV certificates do not include any information about a website’s reputation, real-world identity, or safety. However, many people believe the mere presence of DV certificate ought to connote at least some of these things.&lt;/p&gt;

&lt;p&gt;Treating a DV certificate as a kind of “seal of approval” for a site’s content is problematic for several reasons.&lt;/p&gt;

&lt;p&gt;First, CAs are not well positioned to operate anti­-phishing and anti-malware operations – or to police content more generally. They simply do not have sufficient ongoing visibility into sites’ content. The best CAs can do is check with organizations that have much greater content awareness, such as Microsoft and Google. Google and Microsoft consume vast quantities of data about the Web from massive crawling and reporting infrastructures. This data allows them to use complex machine learning algorithms (developed and operated by dozens of staff) to identify malicious sites and content.&lt;/p&gt;

&lt;p&gt;Even if a CA checks for phishing and malware status with a good API, the CA’s ability to accurately express information regarding phishing and malware is extremely limited. Site content can change much faster than certificate issuance and revocation cycles, phishing and malware status can be page-specific, and certificates and their related browser UIs contain little, if any, information about phishing or malware status. When a CA doesn’t issue a certificate for a site with phishing or malware content, users simply don’t see a lock icon. Users are much better informed and protected when browsers include anti-phishing and anti-malware features, which typically do not suffer from any of these limitations. &lt;/p&gt;

&lt;p&gt;Another issue with treating DV certificates as a “seal of approval” for site content is that there is no standard for CA anti­-phishing and anti-malware measures beyond a simple blacklist of high-­value domains, so enforcement is inconsistent across the thousands of CAs trusted by major browsers. Even if one CA takes extraordinary measures to weed out bad sites, attackers can simply shop around to different CAs. The bad guys will almost always be able to get a certificate and hold onto it long enough to exploit people. It doesn’t matter how sophisticated the best CA anti­-phishing and anti-malware programs are, it only matters how good the worst are. It’s a “find the weakest link” scenario, and weak links aren’t hard to find.&lt;/p&gt;

&lt;p&gt;Browser makers have realized all of this. That’s why they are pushing phishing and malware protection features, and evolving their UIs to more accurately reflect the assertions that certificates actually make.&lt;/p&gt;

&lt;h1 id=&quot;tls-no-longer-optional&quot;&gt;TLS No Longer Optional&lt;/h1&gt;

&lt;p&gt;When they were first developed in the 1990s, HTTPS and SSL/TLS were considered “special” protections that were only necessary or useful for particular kinds of websites, like online banks and shopping sites accepting credit cards. We’ve since come to realize that HTTPS is important for almost all websites. It’s important for any website that allows people to log in with a password, any website that &lt;a href=&quot;https://www.washingtonpost.com/news/the-switch/wp/2013/12/10/nsa-uses-google-cookies-to-pinpoint-targets-for-hacking/&quot;&gt;tracks its users&lt;/a&gt; in any way, any website that &lt;a href=&quot;http://arstechnica.com/tech-policy/2014/09/why-comcasts-javascript-ad-injections-threaten-security-net-neutrality/&quot;&gt;doesn’t want its content altered&lt;/a&gt;, and for any site that offers content people might not want others to know they are consuming. We’ve also learned that any site not secured by HTTPS &lt;a href=&quot;http://krebsonsecurity.com/2015/04/dont-be-fodder-for-chinas-great-cannon/&quot;&gt;can be used to attack other sites&lt;/a&gt;.&lt;/p&gt;

&lt;p&gt;TLS is &lt;a href=&quot;https://blog.mozilla.org/security/2015/04/30/deprecating-non-secure-http/&quot;&gt;no longer the exception&lt;/a&gt;, &lt;a href=&quot;https://www.chromium.org/Home/chromium-security/marking-http-as-non-secure&quot;&gt;nor should it be&lt;/a&gt;. That’s why we built Let’s Encrypt. We want TLS to be the default method for communication on the Web. It should just be a fundamental part of the fabric, like TCP or HTTP. When this happens, having a certificate will become an existential issue, rather than a value add, and content policing mistakes will be particularly costly. On a technical level, mistakes will lead to significant down time due to a slow issuance and revocation cycle, and features like &lt;a href=&quot;https://en.wikipedia.org/wiki/HTTP_Strict_Transport_Security&quot;&gt;HSTS&lt;/a&gt;. On a philosophical and moral level, mistakes (innocent or otherwise) will mean censorship, since CAs would be gatekeepers for online speech and presence. This is probably not a good role for CAs.&lt;/p&gt;

&lt;h1 id=&quot;our-plan&quot;&gt;Our Plan&lt;/h1&gt;

&lt;p&gt;At least for the time being, Let’s Encrypt is going to check with the &lt;a href=&quot;https://developers.google.com/safe-browsing/&quot;&gt;Google Safe Browsing API&lt;/a&gt; before issuing certificates, and refuse to issue to sites that are flagged as phishing or malware sites. Google’s API is the best source of phishing and malware status information that we have access to, and attempting to do more than query this API before issuance would almost certainly be wasteful and ineffective.&lt;/p&gt;

&lt;p&gt;We’re going to implement this phishing and malware status check because many people are not comfortable with CAs entirely abandoning anti-phishing and anti-malware efforts just yet, even for DV certificates. We’d like to continue the conversation for a bit longer before we abandon what many people perceive to be an important CA behavior, even though we disagree.&lt;/p&gt;

&lt;h1 id=&quot;conclusion&quot;&gt;Conclusion&lt;/h1&gt;

&lt;p&gt;The fight against phishing and malware content is an important one, but it does not make sense for CAs to be on the front lines, at least when it comes to DV certificates. That said, we’re going to implement checks against the Google Safe Browsing API while we continue the conversation.&lt;/p&gt;

&lt;p&gt;We look forward to hearing what you think. &lt;a href=&quot;https://community.letsencrypt.org/t/the-cas-role-in-fighting-phishing-and-malware/&quot;&gt;Please let us know&lt;/a&gt;.&lt;/p&gt;
</description>
        <pubDate>Thu, 29 Oct 2015 07:00:00 -0700</pubDate>
        <link>https://letsencrypt.org//2015/10/29/phishing-and-malware.html</link>
        <guid isPermaLink="true">https://letsencrypt.org//2015/10/29/phishing-and-malware.html</guid>
        
        
      </item>
    
  </channel>
</rss>
