by tvvocold on 4/12/22, 2:02 AM with 220 comments
by binwiederhier on 4/12/22, 2:46 AM
It's also quite odd that the article doesn't mention Let's Encrypt or the ISRG at all. I would have expected some sort of acknowledgement to their fantastic work over the years.
by jiggawatts on 4/12/22, 4:34 AM
DigiCert and the like will typically require domain verification at the TLD+1, which is meaningless gibberish that isn't even remotely an RFC standard. There's no such "concept" in DNS, which is intended to be delegated.
So for example if I'm tasked with deploying a web app to "dev1.app.project.org.parentcompany.megacorp.co.uk" where the "project team" is based out of -- say -- Australia, then DigiCert will insist that I verify that I own "megacorp.co.uk", which... I don't. The parent company might not either. MegaCorp's UK head office does. They've never heard of me, and it'll take me a month to get through to someone who cares about my tiny, outsourced project down under.
This kind of thing has happened to me repeatedly across both corporate and government projects. A 2-week project can have a 1 month delay added to it because of this.
ACME gets it right, and nobody else does.
by yonran on 4/12/22, 4:24 AM
by woleium on 4/12/22, 3:43 AM
by _yoqn on 4/12/22, 3:01 AM
by frankfrankfrank on 4/12/22, 11:58 AM
by alpb on 4/12/22, 6:19 AM
by vbezhenar on 4/12/22, 9:19 AM
It's especially great because letsencrypt is operated by US company ISRG and zerossl seems to be from Austria, so if you're not happy with your server being dependant on US, it might be a good option.
by theptip on 4/12/22, 6:14 AM
So if you’re spinning up tens or hundreds of review apps per day, you can’t get a fresh cert for each, and so you need to do something different than your production environment does. (A wildcard cert is the obvious choice.)
I hope this offering has a high enough quota that you can get enough certs to do review apps properly; the marginal cost to Google per customer is probably negligible, whereas LetsEncrypt doesn’t have other revenue generating offerings they can use to cover their operating costs.
by INTPenis on 4/12/22, 5:41 AM
by Tobu on 4/12/22, 2:24 PM
by bogomipz on 4/12/22, 2:23 PM
>"Each of these have different scenarios where their use makes the most sense, for example TLS-ALPN-01 might make sense in cases where HTTPS is not used and the requestor does not have access to dynamically update DNS records."
I'm confused by TLS-ALPN-01. I understand the idea of using certs for domain verification but if there is no TLS in use how does the client verify this after the cert has been issued exactly?
by egberts1 on 4/12/22, 8:50 AM
Q: Do you offer certificates from a pure ECC based certificate chain?
A: Not at this time.
I see what you did there.by PaywallBuster on 4/12/22, 4:56 AM
by aaronchall on 4/12/22, 6:28 AM
Is this another such risk vector?
by midrus on 4/12/22, 5:51 AM
by jesprenj on 4/12/22, 5:17 AM
> Not at this time.
I thought punycode solved all integration issues and is meant to be backwards compatible ...
by robertwt7 on 4/12/22, 4:32 AM
by bruce511 on 4/12/22, 3:19 AM
Wether it lasts or not, this surely has to be an issue for Google innovations going forward? If the perception is that any new thing will die, especially not-consumer-scale things, then how do they build traction?
by steveneo on 4/12/22, 3:08 AM
by acutesoftware on 4/12/22, 3:07 AM
I won't be trying it out.
by lanbanger on 4/12/22, 5:04 AM
by Zhenya on 4/12/22, 4:25 AM
yeesh
by elcomet on 4/12/22, 7:43 AM
by vmception on 4/12/22, 3:02 AM
by JoachimS on 4/12/22, 9:10 AM
If not, possibly reserve a spot here: https://killedbygoogle.com/
by miked85 on 4/12/22, 6:27 AM
by _nickwhite on 4/12/22, 3:14 AM
Obviously kidding! Glad to see this brought online for GCP customers.
by upsidesinclude on 4/12/22, 3:57 AM
by alfiedotwtf on 4/12/22, 3:30 AM
by midjji on 4/12/22, 6:22 AM
by paxys on 4/12/22, 3:04 AM
by ck2 on 4/12/22, 5:00 AM
Do not rely on any "free" google product you aren't willing to pay for.