this post was submitted on 14 Sep 2024
49 points (91.5% liked)
Firefox
20357 readers
105 users here now
/c/firefox
A place to discuss the news and latest developments on the open-source browser Firefox.
Rules
1. Adhere to the instance rules
2. Be kind to one another
3. Communicate in a civil manner
Reporting
If you would like to bring an issue to the moderators attention, please use the "Create Report" feature on the offending comment or post and it will be reviewed as time allows.
founded 5 years ago
MODERATORS
you are viewing a single comment's thread
view the rest of the comments
view the rest of the comments
I don't mean them specifically, but that to me managing access to such a CA cert's keys is security nightmare, because if I somehow get an infection, and it finds the cert file and the private key, it'll be much easier for it to make itself more persistent than I want it.
That's the point. I don't recommend having one. I recommend self signed certs that are
Or if you don't want to deal with self signed certs, buy a domain and do lets encrypt with the DNS challenge.
That's also more secure, but can be more of a hassle, though I guess it depends on preference.
But then I would use this latter one too if I had opened any services to the internet, but I didn't because I don't need to.
I'm in a home environment. I don't have a TPM*, I don't have yubikeys. And no, certificates won't be placed on a lot of servers, as
forgot this part
I assume that too, however the person I responded to recommended using a full fledged CA cert.
You're right. I'm talking about making a certificate using
gpg
and storing it on your system. Then adding it to the root CA list and signing all your Local SSH stuff with it.