1 [[!meta date="2012-01-06 22:01:54 +0100"]]
2 [[!meta title="New SSL certificate for tails.boum.org"]]
7 On the same day Tails 0.10 was put out, our website started to use a
8 commercial SSL certificate. This new certificate replaces the previous one that
9 was delivered by the non-commercial [CACert certificate
10 authority](http://www.cacert.org/).
12 What are SSL certificates?
13 ==========================
15 Using HTTPS instead of plain HTTP to connect to a website allows you to encrypt
16 your communication with the server. But encryption alone does not guarantee
17 that you are talking with the right server, and not
18 someone impersonating it, for example in case of a [[man-in-the-middle
19 attack|doc/about/warning#man-in-the-middle]].
21 SSL certificates try to solve this problem. A SSL certificate is usually issued by
22 a certificate authority to certify the identity of a server. When you reach a
23 website your web browser might trust an SSL certificate automatically if it trusts
24 the authority that issued it.
26 Commercial certificate authorities are making a living out of selling SSL
27 certificates; they are usually trusted automatically by most of the
28 browsers. Other non-commercial authorities, such as
29 [CACert](http://www.cacert.org/), need to be installed by the operating system
30 or by the user to avoid displaying a security warning when visiting the website.
32 Weaknesses of the system
33 ========================
35 But this trust system has proven to be flawed in many ways. For example, during
36 2011, two certificate authorities were compromised, and many fake certificates
37 were issued and used in the wild. See [Comodo: The Recent RA
38 Compromise](http://blogs.comodo.com/it-security/data-security/the-recent-ra-compromise/)
39 and [The Tor Project: The DigiNotar Debacle, and what you should do about
40 it](https://blog.torproject.org/blog/diginotar-debacle-and-what-you-should-do-about-it).
42 It is clear for us that getting an commercial SSL certificate is not enough to
43 strongly authenticate our website, and for example authenticity of our releases.
44 That's why we always propose you [[stronger ways of authenticating our Tails
45 release|/download#authenticity-check]] using OpenPGP signatures.
47 Why get a commercial certificate then?
48 ======================================
50 Still we decided to get a commercial certificate for the following reasons:
52 - It makes it harder to setup a simplistic [[man-in-the-middle
53 attacks|doc/about/warning#man-in-the-middle]] against the people who didn't use HTTPS so
54 far to visit our website.
55 - Our website now is only available with HTTPS enabled. This may be
56 important to provide some confidentiality while posting on the forum