I think it’s a good idea, everyone should be automating this anyway.

  • IsoKiero
    link
    fedilink
    English
    arrow-up
    7
    arrow-down
    1
    ·
    12 小时前

    Valid certificate is anything you trust. Any CA which you can trust is no more or less secure than the one you get from LE, so for the private network you can just happily sign your own certificates and just distribute the CA to your devices.

    • wildbus8979@sh.itjust.works
      link
      fedilink
      English
      arrow-up
      1
      ·
      11 小时前

      But then you have to distribute CAs to all the devices that will reach this service, and not all devices allow that.

      • IsoKiero
        link
        fedilink
        English
        arrow-up
        2
        ·
        8 小时前

        True. And there’s also a ton of devices around which don’t trust LetsEncrypt either. There’s always edge cases. For example, take a bit older photocopier and it’s more than likely that it doesn’t trust on anything on this planet anymore and there’s no easy way to update CA lists even if the hardware itself is still perfectly functional.

        That doesn’t mean that your self-signed CA, in itself, would be technically any less secure than the most expensive Verisign certificate you can find. And yes, there’s a ton of details and nuances here and there, but I’m not going to go trough every technical detail about how certificates work. I’m not an expert on that field by any stretch even if I do know a thing or two and there’s plenty of material online to dig deep into the topic if you want to.

        • wildbus8979@sh.itjust.works
          link
          fedilink
          English
          arrow-up
          1
          ·
          edit-2
          8 小时前

          I’m good. I know very well there are uses cases for a self signed cert. LE is still far more practical for 99% of use cases, even internally.