Thanks. This is new to me and I’m going to be looking into it.
Comment on How to selfhost with a VPN
stratself@lemdro.id 7 months agoLet’s Encrypt are rolling out IP-based certs, you may wanna follow its development. I’m not sure if it could be used for your forwarded VPN port, but it’d be nice anyhow
humanoidchaos@lemmy.cif.su 7 months ago
turmoil@feddit.org 7 months ago
As I use docker for most of my deploys (as you should for websites exposed to the Internet anyway), I can wholeheartedly recommend traefik for this. Basically it has the functionality of nginx, but supports easy Let’s Encrypt certificates.
Laser@feddit.org 7 months ago
It shouldn’t be because you’re not actually the owner of the IP address. If any user could get a cert, they could impersonate any other.
No, encryption only protects the confidentiality of data. You need message authentication codes or authenticated encryption to make sure the message hasn’t been transported with. Especially stream ciphers like ChaCha (but also AES in counter mode) are susceptible to malleability attacks, which are super simple yet very dangerous.
frezik@lemmy.blahaj.zone 7 months ago
Public key crypto, properly implemented, does prevent MITM attacks. TLS does do this, and that’s all that matters here
Laser@feddit.org 7 months ago
It does, but modern public key crypto doesn’t encrypt any client data (RSA key exchange was the only one to my knowledge). It also only verifies the certificates, and the topic was about payload data (i.e. the site you want to view), which asymmetric crypto doesn’t deal with for performance reasons.
My post was not about “does TLS prevent undetected data manipulation” (it does), but rather if it’s the encryption that is responsible for it (it’s not unless you put AES-GCM into that umbrella term).
frezik@lemmy.blahaj.zone 7 months ago
Client data absolutely is encrypted in TLS. You might be thinking of a few fields sent in the clear, like SNI, but generally, it’s all encrypted.
Asymmetric crypto is used to encrypt a symmetric key, which is used for encrypting everything else (for the performance reasons you mentioned). As long as that key was transferred securely and uses a good mode like CBC, an attacker ain’t messing with what’s in there.
I think you’re confusing the limitations of each building block with how they’re actually implemented together in TLS. The whole suite together is what matters for this thread.
SteveTech@programming.dev 7 months ago
They’re ‘shortlived’ 7 day certs, verified using a HTTP challenge. It doesn’t matter who owns the IP, it’s just a matter of who holds the IP.
Laser@feddit.org 7 months ago
Right, and for the challenge, you need to have access to a privileged port (which usually implies ownership), which you won’t get assigned.
stratself@lemdro.id 7 months ago
Ah right, completely forgot about that (80 for HTTP-01, 443 for TLS-ALPN-01)