@madargon@is-a.cat avatar madargon , to random

RE: https://mastodon.social/@nixCraft/115906354891838530

So... it's here, right? After I waited almost 7 years... And it hopefully wouldn't turn into other "after 9 months pay us 10$/month" scam like ZeroSSL...

And... I will finally have federation in my Matrix server I guess :blobcatjoy:

It was funny to try to set it up. I don't understand how these automation scripts work - all I know was how to do things manually with simple bash scripts and openssl config files.
Last night it finally worked with acme.sh, so maybe it would just keep working itself from now...

@aral@mastodon.ar.al avatar aral , to random

🥳 Multiple major releases today

@small-tech/auto-encrypt v5.0.0 (https://codeberg.org/small-tech/auto-encrypt#readme)
@small-tech/auto-encrypt-localhost v10.0.0 (https://codeberg.org/small-tech/auto-encrypt-localhost/#readme)
@small-tech/https v6.0.0 (https://codeberg.org/small-tech/https/#readme)

These releases bring short-lived certificates, IP Address (IPv4 and IPv6) support, and ACME Renewal Information (ARI) support to Auto Encrypt and @small-tech/https, implement a consistent asynchronous API across all three packages, and include loads of little fixes and code quality improvements.

This brings us very close to getting Web Numbers¹ support implemented natively in Kitten².

OCSP support is removed from Auto Encrypt and Windows support is dropped from all three packages as Microsoft is complicit in Israel’s genocide of the Palestinian people³ and Small Technology Foundation⁴ stands in solidarity with the Boycott, Divestment, and Sanctions (BDS) movement. Furthermore, Windows is an ad-infested and surveillance-ridden dumpster fire of an operating system and, alongside supporting genocide, you are putting both yourself and others at risk by using it.

Enjoy!

💕

🇵🇸 To support families facing genocide in Gaza, consider donating to them via Gaza Verified: https://gaza-verified.org/donate/

¹ https://ar.al/2025/06/25/web-numbers/
² https://kitten.small-web.org/
³ https://www.bdsmovement.net/microsoft
https://small-tech.org/

@aral@mastodon.ar.al avatar aral , to random

🥳 @small-tech/auto-encrypt-localhost version 9.0.1 released

Automatically provisions and installs locally-trusted TLS certificates for Node.js https servers (including Polka, Express.js, etc.) Unlike mkcert, 100% written in JavaScript with no external/binary dependencies. As used in Kitten¹

https://codeberg.org/small-tech/auto-encrypt-localhost#readme

This is a housekeeping release:

• Add TypeScript type definitions.
• Improve code quality; fix all type warnings.
• Update dependencies and remove all npm vulnerability warnings.

Full change log: https://codeberg.org/small-tech/auto-encrypt-localhost/src/branch/main/CHANGELOG.md

Enjoy! 💕

¹ https://kitten.small-web.org

@aral@mastodon.ar.al avatar aral , to random

🥳 @small-tech/syswide-cas v7.0.2 released

Enables Node.js to use custom Certificate Authorities (CAs) alongside the bundled root CAs.

https://codeberg.org/small-tech/syswide-cas#readme

• Drops legacy Node support
• Is now ESM
• Improved code quality
• Added TypeScript type information

Full change log: https://codeberg.org/small-tech/syswide-cas/src/branch/main/CHANGELOG.md

Enjoy!

💕

@aral@mastodon.ar.al avatar aral , to random

🥳 Auto-Encrypt Localhost version 9.0.0 released

Bye bye, Windows.

• Windows is no longer supported as Microsoft is complicit in Israel’s genocide of the Palestinian people¹ and Small Technology Foundation² stands in solidarity with the Boycott, Divestment, and Sanctions (BDS) movement³. Windows is an ad-infested and surveillance-ridden dumpster fire of an operating system and, alongside supporting genocide, you are putting both yourself and others at risk by using it.

Enjoy!

💕

About Auto-Encrypt Localhost:

https://codeberg.org/small-tech/auto-encrypt-localhost#readme

Auto Encrypt Localhost is similar to the Go utility mkcert but with the following important differences:

  1. It’s written in pure JavaScript for Node.js.

  2. It does not require certutil to be installed.

  3. It uses a different technique to install its certificate authority in the system trust store of macOS.

  4. It uses enterprise policies on all platforms to get Firefox to include its certificate authority from the system trust store.

  5. In addition to its Command-Line Interface, it can be used programmatically to automatically handle local development certificate provisioning while creating your server.

Auto-Encrypt Localhost is licensed under AGPL version 3.0.

¹ https://www.bdsmovement.net/microsoft
² https://small-tech.org/
³ https://www.bdsmovement.net/

@blainsmith@snac.rblgk.sh avatar blainsmith , to random

Caddy's on_demand_tls is very cool. Going to be making heavy use of that on an upcoming project.

@aral@mastodon.ar.al avatar aral , to Testing

Just updated Node Pebble to support latest release version of Let’s Encrypt’s Pebble testing server.

https://codeberg.org/small-tech/node-pebble

Enjoy!

💕

@resingm@infosec.exchange avatar resingm , to random

Reaching out to anyone who configured their DNS transport protocol. If you intentionally configured your home router's or your devices DNS service, what did you pick, and why?

Please retoot for reach.

@h4ckernews@mastodon.social avatar h4ckernews Bot , to random
@ben@hardill.me.uk avatar ben , to random

Given the push by the Browser's (OK, mainly Google and Apple iirc) to vastly reduce the life time of server certificates (down to 47 days)

That's ~8 certificate changes a year.

What is this going to 5 9s uptime? That's 5m 30 seconds of down town a year that needs to now cover that many restarts before anything else.

(Yeah, I know some things will reload certs on HUP and you can do rolling restarts of clusters)

@chrysn@chaos.social avatar chrysn , to random

While I do maintain that "it's coming from the LAN" is not a good boundary, there are services where it is practical (eg. media center volume control), but also fault prone (oups my phone just switched to LTE for power saving – a generally justified thing).

Before I start formalizing how "a device can retain permissions it gets from being local for a few days" could work with EST//: Does this model have a name, and/or have you ever seen it discussed or deployed anywhere?

@piwo@fosstodon.org avatar piwo , to random Polish

🎬 SSL/TLS i walidacja certyfikatów, what could possibly go wrong?

Błażej Orzechowski opowiada o znaczeniu szyfrowania w internecie, wyjaśnia rolę HTTPS, SSL/TLS i certyfikatów w ochronie danych.

👉 PeerTube: https://tube.pol.social/w/uqcqPCEEq8dU2odbb4dA7J
👉 YouTube: https://youtu.be/DB_boLriKwA?feature=shared

@guardianproject@librem.one avatar guardianproject , to random

has completed implementation for and there is a pull request:

https://github.com/nginx/nginx/pull/840

If you want to see ECH in nginx sooner rather than later, please jump in and review, give feedback, thumbs up, etc.

@h4ckernews@mastodon.social avatar h4ckernews Bot , to random
@h4ckernews@mastodon.social avatar h4ckernews Bot , to random
@beardedtechguy@infosec.exchange avatar beardedtechguy , to random

This could pose a problem! Be vigilant guys and gals.

Free certificates for IP addresses: security problem or solution? https://www.malwarebytes.com/blog/news/2025/07/free-certificates-for-ip-addresses-security-problem-or-solution

beardedtechguy OP ,
@beardedtechguy@infosec.exchange avatar

@aral Great point — and I agree that most users would be suspicious if they saw an IP address like 89.72.4.2 instead of a familiar domain like mybank.com. The concern raised in the article, though, was more about scenarios where users don’t see the link clearly — such as in emails, PDFs, or messaging apps where URLs may be masked behind anchor text or shortened links. For example, a phishing email might show a link that says “View Invoice” but actually points to https://203.0.113.10/login.

Experienced users like you and I know to hover over links, check certificate info, or inspect the address bar. But many users don’t do that — or worse, they click links without verifying anything. According to the Verizon DBIR and other phishing studies, this is still one of the top attack vectors today.

Also, I don’t think the article was arguing against IP certs outright — just highlighting that, like with any new capability, there's potential for abuse that the broader public (and infosec community) should be aware of.

@aral@mastodon.ar.al avatar aral , to random

Introducing Web Numbers

Domains? Where we’re going, we don’t need domains!

Get ready for an exciting new (old?) way to address (small) web sites in 2026.

https://ar.al/2025/06/25/web-numbers/

💕

(Thanks to @letsencrypt .)

@patpro@social.patpro.net avatar patpro , to random

Hello, I’m hosting a server behind 2.10 and made the following test:

Tuning Caddy to allow only curves:

	tls {
		curves x25519mlkem768
	}

Trying to connect with Mac -> OK
Trying to connect with client -> Fail

Without the tuning, the Bitwarden Android client will happily connect to the server.

Is it a problem with the Bitwarden Android client or with Android, or both?

@h4ckernews@mastodon.social avatar h4ckernews Bot , to random
@screwlisp@gamerplus.org avatar screwlisp , to random

https://screwlisp.small-web.org/kitten/clkitten-parenscript-kitten-2/

Eev (and lisp secret alien technology) made it /really/ easy and convenient to generate a kitten matching @aral 's Tutorial 2: dynamic pages, https://kitten.small-web.org/tutorials/dynamic-pages/ serve it and visit it inside emacs (just press F8 over and over again and it happens on its own).

I guess you can do it too...? What do you think? How much of a Hurkle itch is this giving you Aral ;p. It seems /really/ easy to get a fancy! site up like this.

ALT
@aral@mastodon.ar.al avatar aral , to random

🔒 Auto Encrypt – heads up!

In the next minor version release of Auto Encrypt¹, we’ll be moving from a hard-coded date-based certificate renewal check to using ACME Renewal Information (ARI)².

The change³ should be seamless.

If you have any concerns, now is the time to raise them :)

¹ Drop-in Node.js https server replacement that automatically provisions and renews Let’s Encrypt certificates for you. (https://codeberg.org/small-tech/auto-encrypt#auto-encrypt)
² https://datatracker.ietf.org/doc/draft-ietf-acme-ari/
³ https://codeberg.org/small-tech/auto-encrypt/src/branch/main/CHANGELOG.md#4-4-0-2025

@aral@mastodon.ar.al avatar aral , (edited ) to random

👋🤓 Goodbye Site.js, Hello Kitten!

I started working on creating a Small Web¹ server (a peer-to-peer Web server) six years ago² with Site.js.

Building Site.js was my first attempt. And it resulted in:

• Auto Encrypt (automatic Let’s Encrypt certificates): https://codeberg.org/small-tech/auto-encrypt

• Auto Encrypt Localhost (automatic localhost TLS certificates): https://codeberg.org/small-tech/auto-encrypt-localhost

@small-tech/https (drop-in Node.js https module replacement with automatic TLS certs everywhere): https://codeberg.org/small-tech/https

• JSDB: In-process, in-memory JavaScript database that persists to append-only JavaScript logs: https://codeberg.org/small-tech/jsdb

As Site.js reached an evolutionary dead-end, and as I learned from my experiements with replicated data types that replicated data types are not a prerequisite for a decentralised web (actual topological decentralisation and ease of use are), I started writing a new server/platform called Kitten from scratch while still making use of the tried and tested modules listed above.

Last week, I switched over our last site using Site.js to Kitten and, with that, today I’ve sunset³ Site.js:

https://sitejs.org

For its successor, please see Kitten:

https://kitten.small-web.org

If you want to support our work at the Small Technology Foundation, please consider becoming a patron:

https://small-tech.org/fund-us

:kitten:💕

¹ https://ar.al/2024/06/24/small-web-computer-science-colloquium-at-university-of-groningen/
² https://ar.al/2019/08/26/introducing-small-technology-foundation/
³ Using our instance of Look Over There!: https://look-over-there.small-web.org

ALT
@Daojoan@mastodon.social avatar Daojoan , to random

Email is the cockroach of the internet - it outlives every wave trying to kill it. Forget Slack, forget Discord, forget chat apps. Email is universal, decentralized, and asynchronous. It's not sexy, but it's the ultimate survivor.

dominik ,
@dominik@librem.one avatar

@Daojoan It is well developed with technologies such as DANE and TLS-receiving guarantee.
The standard user only has to choose the right provider.

dominik ,
@dominik@librem.one avatar

@Daojoan is well developed with technologies such as DANE and TLS-receiving guarantee.
The standard user only has to choose the right provider.

@mirabilos@toot.mirbsd.org avatar mirabilos , to random

What the actual fuck,

Let’s Encrypt will no longer include the “TLS Client Authentication” Extended Key Usage (EKU) in our certificates beginning in 2026.

That makes them unusable for SMTP servers. Gah!

Anyone got a usable alternative that doesn’t ruin financially?

Update: I’m in communication with them, let’s hope they recognise the usefulness.

Update 2: turns out it’s Google forcing this down the throat of all CAs that want to be recognised by Chrome as valid. I’m sure Google only accidentally decided on a new policy that breaks some SMTP and probably all XMPP use cases… 🤬

mirabilos OP ,
@mirabilos@toot.mirbsd.org avatar

@rl_dane @ShinjiLE if you or someone else wants to help argue, the thread is at https://community.letsencrypt.org/t/do-not-remove-tls-client-auth-eku/237427 (Discourse, so JS webbrowser), I’m exhausted.