Readit News logoReadit News
benburkert commented on Show HN: Anchor Relay – A faster, easier way to get Let's Encrypt certificates   anchor.dev/relay... · Posted by u/geemus
traceroute66 · 7 months ago
Oh dear.

I'm sorry. But do you really need to re-invent the wheel yet again ?

Go to the Let's Encrypt website, there is a whole page of client implementations[1].

What makes yours better than, for example, `lego` or `caddy` or `step` ?

All of which are easy to use, come with sensible defaults and do not provide you with "innumerable ways to shoot yourself in the foot".

And for people who really can't use Let's Encrypt because "its difficult", there are still all the old-school, well-established, commercial CA's out there who will hold your hand in return for a few dollars.

[1] https://letsencrypt.org/docs/client-options/

benburkert · 7 months ago
We don't think of it as reinventing the wheel since it works with all existing RFC compliant ACME clients without needing a plugin. You can use lego, caddy, certbot, cert-manager, or whichever ACME client you prefer.

ACME is great and it's certainly an improvement over the legacy CA alternatives. But there's also some rough edges that we think can be streamlined.

benburkert commented on Show HN: Anchor Relay – A faster, easier way to get Let's Encrypt certificates   anchor.dev/relay... · Posted by u/geemus
masfuerte · 7 months ago
Right, but if you want people to trust you, you need to be open about what people are trusting you with. Your original answer seemed obfuscatory.
benburkert · 7 months ago
Sorry, not trying to obfuscate anything, hopefully this clarifies: users trust us to hold their ACME account key and we only ask for DNS records prefixed with `_acme-challenge.` to be CNAME delegated.

With this we could issue or revoke a new certificate, but we couldn't impersonate them because we don't control the rest of their DNS.

benburkert commented on Show HN: Anchor Relay – A faster, easier way to get Let's Encrypt certificates   anchor.dev/relay... · Posted by u/geemus
masfuerte · 7 months ago
If users delegate their DNS to you, what's stopping you issuing a certificate to yourself for their site?
benburkert · 7 months ago
We theoretically could, but those certificates would show up in CT logs. (For quick & easy monitoring, you can get an RSS feed for your domain on https://crt.sh/, but it's not the most reliable service.) It would be a reputation killer if we did that, just like it would be for your DNS provider or ISP.
benburkert commented on Show HN: Anchor Relay – A faster, easier way to get Let's Encrypt certificates   anchor.dev/relay... · Posted by u/geemus
aeaa3 · 7 months ago
Does this means that you have the ability to

a) impersonate the identities of your users and b) decrypt the SSL traffic of your users

?

benburkert · 7 months ago
It does not.

Anchor never see sees your private keys for certificates.

We hold an ACME account key on your behalf with the CA, but we cannot use it impersonate your domain or decrypt traffic.

We have a more technical overview of how this works in our docs: https://anchor.dev/docs/public-certs/acme-relay

benburkert commented on Show HN: Anchor Relay – A faster, easier way to get Let's Encrypt certificates   anchor.dev/relay... · Posted by u/geemus
NoahZuniga · 7 months ago
Your site doesn't work. The right arrow button is always disabled
benburkert · 7 months ago
sorry about that! mind sharing what domain name (or something similar that also doesn't work) & what browser you used?
benburkert commented on TLS certificate lifetimes will officially reduce to 47 days   digicert.com/blog/tls-cer... · Posted by u/crtasm
webprofusion · a year ago
Does your hosted service know the private keys or are they all on the client?
benburkert · a year ago
No, they stay on the client, our service only has access to the CSR. From our docs:

> The CSR relayed through Anchor does not contain secret information. Anchor never sees the private key material for your certificates.

benburkert commented on TLS certificate lifetimes will officially reduce to 47 days   digicert.com/blog/tls-cer... · Posted by u/crtasm
formerly_proven · a year ago
I'm surprised there is no authorization-certificate-based challenge type for ACME yet. That would make ACME practical to use in microsegmented networks.

The closest thing is maybe described (but not shown) in these posts: https://blog.daknob.net/workload-mtls-with-acme/ https://blog.daknob.net/acme-end-user-client-certificates/

benburkert · a year ago
It's 100% possible today to get certs in segmented networks without a new ACME challenge type: https://anchor.dev/docs/public-certs/acme-relay

(disclamer: i'm a founder at anchor.dev)

benburkert commented on Show HN: lcl.host for Teams – team-wide local HTTPS in development   lcl.host/... · Posted by u/benburkert
benburkert · 2 years ago
Hi HN! I'm part of the Anchor (https://anchor.dev/) team building lcl.host: <https://lcl.host/>

We launched lcl.host in March as the easiest way to get HTTPS in your development environment, and today we're launching new features to make lcl.host the best local HTTPS experience for development teams.

Before lcl.host, setting up HTTPS in your local development environment was an annoyance, but getting your team to use it is a PITA. That's because practically all tools for local HTTPS work the same way: generate a local CA certificate, install it into the local trust stores, then use it to issue certificates for a localhost domain. They all share a drawback: the certificates are only meant to work on one system. If your team wants to standardize on using HTTPS in development, each developer has to learn the tooling and repeat the same process in their own environment.

But lcl.host works differently: it takes one developer to setup encryption on an app and now everyone has local HTTPS. Instead of individual self-signed CAs, Anchor builds and manages a dedicated CA for your team's development environments.

It's 100% free, try it out at <https://lcl.host/>

Or, skip the marketing and run this instead:

    $ brew install anchordotdev/tap/anchor
    $ anchor lcl
More on teams features here: https://anchor.dev/docs/lcl-host/teams

As well as demo video: https://www.youtube.com/watch?v=ilLiAabWa4g

We are asking for feedback on our features for teams features for local HTTPS, and would like to hear your thoughts & questions. Many thanks!

u/benburkert

KarmaCake day138September 9, 2008View Original