The Lounge is rated Safe For Work. If you're about to post something inappropriate for a shared office environment, then don't post it. No ads, no abuse, and no programming questions. Trolling, (political, climate, religious or whatever) will result in your account being removed.
Agreed, but remember that for DECADES our poor practices at protecting thing (Storing passwords clear text in DBs associated with the users, shoving them in COOKIES (OMG) as opposed to some GUID), and thinking we can ADD security later.
You know, like we can ADD performance Later... (Every project I've seen with that attitude suffered massive performance issues. You DESIGN for performance, you implement with care. If speed is important, then it's part of the CONTRACT and TRACING).
If Security is remotely important. It's got to be part of the contract.
And in todays world. Let's ASSUME that a LACK of security is a NON-STARTER.
The tools are getting easier/better. But people still not understanding which is the PRIVATE KEY and which is the PUBLIC KEY is getting old. (of course calling them both key files, and sometimes .key or no extension doesn't help, but the .pub should be pretty obvious).
--> We've come a VERY LONG way since the 1940s (Pre-Fortran). C, C++ (Objects), (Frameworks), and more!
You likely have a few more grey hairs than I. But I did write some Fortran... in high school.
It should be relatively easy to make something configured only for SSL work without it. It's removing complexity vs adding it. Mostly that complexity is abstracted from the developer into configuration details with libraries and frameworks handling the nitty gritty of hand shakes and certificates. In most cases, I'd guess the developer need only do configurational things and provide appropriate files. "Only"... heh.
It is the case that some recent work was approached in just that way which is why I'm aware of the contextual "no don't do SSL" from Microsoft.
Performance is a tricky thing. I don't disagree about designing with it in mind, but I might be wary of getting terribly caught up in "pre-optimization". It's maybe sometimes easier to see what needs the most grease once the machine is running.
My gut says it tends less to be that things weren't designed with performance in mind. The modern development practice of trying to reuse every wheel possible while creating as few purpose built ones as one can get away with? We had a frame, wheels, chain, gear, and pedals so we rather efficiently glue them all together in Henry Ford fashion. But then we find we are riding a 1-speed bike up a hill.
Moore's law and related meant we got way more resources than we needed and we leveraged them. Perfection took a far back seat to productivity. Regardless of where that falls on one's bad<->understandable<->good line, it does mean that a sizeable majority have never had to think very much about it at all.
because years ago someone complained about someone walking around naked, they were chill with it, if you dont want to look thats on you. but nah, all the offended people got together and said, NO, privates should be covered by default we making some laws about it, then everyone like ok and followed along.
Its more the 1 person that was taking pictures of other naked people in public, which if they didnt go and share it out with everone else, probably would have been an issue, but they did, and complaints were made.
the real annoying part is when its your own local home and its still like no, you gotta go extra steps if want to be un clothed here. but I own this, I know this place, its okay. No your password for localhost appears on a leak list, imma be dumb and not filter out admin admin for localhost
You are clearly missing the point.
Did you know the IRS has a rule that they can use ILLEGALLY Obtained information against you?
I used to be you! (Since I don't break the law, what do I care!)
Here is the simplest example. Given JUST the data the government admits it collects from Cellphone data...
I can geofence rich neighborhoods, and houses, and EXPENSIVE hotels nearby. I can now calculate who is having affairs.
Where they live, who they are having the affair with. Where both people work and live. In Bulk, in MINUTES.
Now, I knock on your door, and I confront you, and suggest your wife need not know, if you DONATE a reasonable sum to my political campaign, or whatever. (Having an affair is NOT ILLEGAL). Being extorted is. But you are powerless. BTW, they know enough to destroy your career. (FWIW, I've seen this very tactic, and years long legal fees sponsored by our own government used).
How about framing you for a crime you did not commit. But they used your cellphone data (In advance of trumping up the charges to put you in the area, where they knew you had no alibi).
This data can be used to solve crimes, or to implicate people. Our constitution is SUPPOSED to protect us.
It does not! Because they don't have to WIN the lawsuit. The person I know, did NOT lose the case. But they lost MILLIONS and had to step down from their position.
And how about CA... They "accidentally" published FULL ID information on all concealed carry people (I think in one county). Addresses, DOBs, License #s, and type of weapon.
Think LONG AND HARD... Would you be comfortable knowing that ALL of the information about you, that is stored on your computer, in your emails, including Bank Account #s, ids, ssn, etc. Were available for sale? Along with your Cell Phone data?
I'm annoyed by Linux for similar reasons. It's a lot of hacks on hacks, a lot of accepting the status quo as how things must be instead of taking a huge step back & re-evaluating whether the present behavior really is the best platform to build the future upon.
However, do you really have to deal with it every 90 days yourself? Meaning, can't you schedule that stuff (assuming there's no more troubleshooting involved)?
I can probably automate it now that it's fixed but I am concerned about the issues that I had to troubleshoot or similar cropping up again and maybe blowing up my site when I'm not around, so my other plan was to maybe have it send me mail just before I need to renew but I don't have qmail installed or anything like that.
I have other issues currently that are making demands on my time so I haven't fiddled with it. I figure I have about 80 days to come up with something.
I find your experience very weird. Especially since you think everything needs to be unbound from http port before you can use certbot. The whole *point* of certbot is that it checks to see if the machine it is running on is the machine that it can reach a http site at... Therefore, they know who it is that requested the certificate.
FWIW, I have a bit of trouble with certbot because my default firewall configuration blocks http to internet, so I have to whitelist the port, run certbot, and unwhitelist every three months. Takes literally 5 seconds. I don't know what you're doing, but "it works on my machine"!
BTW, please don't blame Linux for what is clearly a certbot problem. Remember, Linux is fragmented, so there are many many good softwares and designs that you use on Linux constantly without realizing, and only a few that are bad. It's not all one giant corporation putting out completely bad stuff.... or updating constantly to provide new icon sets.
It is a principle in cryptography that only encrypting 'what is important' just tells adversaries what to focus on. It gives them valuable information that they would not otherwise have, and the last thing you want to give adversaries is any information.
Just wondering how/if this is a linux specific problem, and not just a certbot problem (or something else)? Would the same [equivalent] steps have worked any better on Windows?
Pictures of error messages, please "or it didn't happen ™".
Its been awhile, but I think I has a horrible experience with the certbot script and just set it up manually (using instructions similar to, if not the same as: https://ivopetkov.com/b/let-s-encrypt-on-ec2/, and never looked back. However, the referenced github repo doesn't seem to exist as-such anymore (and redirects to the certbot repo). But that does still includes the letsencrypt-auto script (for now).
Not entirely sure this is the same kind of cert you're talking about, but have you looked into free SSL through Cloudflare? Automatic and zero work. Although, IINM, the free version is only SSL at the edge servers where everything is (eventually) cached, not SSL all the way to the host, unless you set it up that way. Edge node is fine for a lot of things.
Depends on the language the original was written in as well as how well-structured it is.
I would go about this by first and foremost separating business logic from plumbing. Then, by mapping the APIs used in the business logic part to .NET parts. While P/Invoking them is certainly feasible, that's only advised if the goal is defined as sticking as close as possible to the original and/or there's no corresponding .NET APIs.
Last Visit: 31-Dec-99 18:00 Last Update: 13-Aug-22 13:31