• 3 Posts
  • 171 Comments
Joined 3 months ago
cake
Cake day: June 21st, 2024

help-circle
  • Just one open source example … freeradius has an option to log passwords:

    log {
        destination = files
        auth = no
        auth_badpass = no
        auth_goodpass = no
    }
    

    Or another example: The apache web server has a module that dumps all POST data, with passwords, in plain text:

    mod_dumpio allows for the logging of all input received by Apache and/or all output sent by Apache to be logged (dumped) to the error.log file. The data logging is done right after SSL decoding (for input) and right before SSL encoding (for output). As can be expected, this can produce extreme volumes of data, and should only be used when debugging problems.

    I don’t agree that this is “absolutely malice”, it could also be stupidity and forgetfulness.















  • cron@feddit.orgtoSelfhosted@lemmy.worldPaid SSL vs Letsencrypt
    link
    fedilink
    English
    arrow-up
    12
    ·
    edit-2
    19 days ago

    You’re right, Google released their vision in 2023, here is what it says regarding lifespan:

    a reduction of TLS server authentication subscriber certificate maximum validity from 398 days to 90 days. Reducing certificate lifetime encourages automation and the adoption of practices that will drive the ecosystem away from baroque, time-consuming, and error-prone issuance processes. These changes will allow for faster adoption of emerging security capabilities and best practices, and promote the agility required to transition the ecosystem to quantum-resistant algorithms quickly. Decreasing certificate lifetime will also reduce ecosystem reliance on “broken” revocation checking solutions that cannot fail-closed and, in turn, offer incomplete protection. Additionally, shorter-lived certificates will decrease the impact of unexpected Certificate Transparency Log disqualifications.