I’m curious what the benefits are of paying for SSL certificates vs using a free provider such as letsencrypt.

What exactly are you trusting a cert provider with and what are the security implications? What attack vectors do you open yourself up to when trusting a certificate authority with your websites’ certificates?

In what way could it benefit security and/or privacy to utilize a paid service?

And finally, which paid SSL providers are considered trustworthy?

I know Digicert is a big player, but their prices are insane. Comodo seems like a good affordable option, but is it a trustworthy company?

  • Opisek@lemmy.world
    link
    fedilink
    English
    arrow-up
    2
    ·
    edit-2
    3 months ago

    OP’s security concern is valid. Different CAs may differ in the challenges used to verify you to be the domain owner. Using something that you could crack may lead to an attacker’s public key being certified instead.

    This could for example be the case with HTTPS verification (place a file with a specific content accessible through your URL) if the website has lacking input sanitization and/or creates files with the user’s input at an unfortunate location that collides with the challenge.

    This attack vector might be far-fetched, but there can certainly be differences between different signing authorities.

    • Terrasque@infosec.pub
      link
      fedilink
      English
      arrow-up
      7
      ·
      3 months ago

      But even if you use GoMommy extra super duper triple snake oil security checked ssl cert, if I trick LetsEncrypt to sign a key for that domain I still have a valid cert for your site.

      • Mike1576218@lemmy.ml
        link
        fedilink
        English
        arrow-up
        1
        ·
        edit-2
        3 months ago

        Certificate pinning?

        Also all let’s encrypt certs are public. So if someone malicious gets a cert for your domain, you can notice.

        (Thats also why it may be a bad idea to use that for secretButPublicStuff.Yourdomain.com certificate transparency logs are a great way to find attack surface.)

        edit oh certificate pinning has been deprecated in favor of checking transparency logs.