wetdry.world is one of the many independent Mastodon servers you can use to participate in the fediverse.
We are a community focused on gaming, tech, entertainment, and more.

Administered by:

Server stats:

733
active users

#tls

5 posts5 participants0 posts today
Public

Experience sessions like this live at SharkFest'25 US, happening June 14–19 in Richmond, VA. Join industry experts and fellow enthusiasts for hands-on labs, in-depth lectures, and unparalleled networking opportunities.​

youtube.com/watch?v=Cq6yj9se9M

Secure your spot today: sharkfest.wireshark.org/sfus

Public

Ooh, what’s this?… Look Over There!
(With apologies to Jaida Essence Hall)

So the little app I teased earlier is ready and deployed and I have our own instance running at:

look-over-there.small-web.org

Look Over There! lets you forward multiple domains to different URLs with full HTTPS support.

Why?

We have a number of older sites that are becoming a chore/expensive to maintain and yet I don’t want to break the web. So I thought, hey, I’ll just use the “url forwarding” feature of my domain registrar to forward them to their archived versions on archive.org.

Ah, not so fast, young cricket… seems some domain registrars’ implementations of this feature do not work if the domain being forwarded is accessed via HTTPS (yes, in 2025).

So, given Kitten¹ uses Auto Encrypt² to automatically provision Let’s Encrypt certificates, I added a domain forwarding feature to it and created Look Over There! as a friendly/simple app that provides a visual interface to it.

To see it in action, hit cleanuptheweb.org and you should get forwarded to the archived version of it on archive.org. I’m going to be adding more of our sites to the list in the coming days as part of an effort to reduce my maintenance load and cut down our expenses at Small Technology Foundation.

Since it’s Small Web, this particular instance is just for us. However, you can run your own copy on a VPS (or even a little single-board computer at home, etc.) A link to the source code repository is on the site. Once Domain³ is ready for use (later this year 🤞), setting up your own instance of a Small Web app at your own server will take less than a minute.

I hope this little tool, along with the 404→307 (evergreen web) technique⁴, helps us to nurture an evergreen web and avoid link rot. (And the source code, as little as there is because Kitten does so much for you, is a good resource if you want to learn about Kitten’s new class-based component and page model which I haven’t yet had a chance to properly document.)

Enjoy!

:kitten:💕

¹ kitten.small-web.org
² codeberg.org/small-tech/auto-e
³ codeberg.org/domain/app
4042307.org

Public

Don't trust security check websites.
I just went through 10 online #TLS checkers from <techarry.com/top-ssl-tls-testi>, and only 2 of them (<testtls.com/> and <ssllabs.com/ssltest/>) even managed to scan the #IPv6-only site I was scanning. For all the others: How do you expect to run a comprehensive test when you can't even resolve half the addresses?

TechArry - Your Gateway to Cybersecurity Articles · Top SSL/TLS Testing Tools: Open Source & Online Scanners - TechArryExplore top SSL/TLS testing tools, including open-source options in Kali Linux and free online scanners, to secure your website and detect vulnerabilities.
Public

happened early April, but worth sharing. Certs will only have 47 days of validity by 2029. validity lengths will progressively get shorter from march 2026 until then. Reusing domain validation material will be limited to 10 days.

IMO this is a very good thing.

this is diff to the very short validity certs that can be issued now. Lets Encrypt will offer 6 day certs by end of yr

I'm sure cleaner versions will be released, but here's the diff

github.com/cabforum/servercert

Repository for the CA/Browser Forum Server Certificate Chartered Working Group - Comparing b7fd69b36171d81930e7758482984ce957a1ce7a...abf6c4e3845040069672d58cd2dd80ede8f42012 · cabforum/servercert
GitHubComparing b7fd69b36171d81930e7758482984ce957a1ce7a...abf6c4e3845040069672d58cd2dd80ede8f42012 · cabforum/servercertRepository for the CA/Browser Forum Server Certificate Chartered Working Group - Comparing b7fd69b36171d81930e7758482984ce957a1ce7a...abf6c4e3845040069672d58cd2dd80ede8f42012 · cabforum/servercert
Public

digicert.com/blog/tls-certific

The CA/Browser Forum has officially voted to amend the TLS Baseline Requirements to set a schedule for shortening both the lifetime of TLS certificates.

The maximum certificate lifetime is going down:

- As of March 15, 2026, the maximum lifetime for a TLS certificate will be 200 days.
- As of March 15, 2027, the maximum lifetime for a TLS certificate will be 100 days.
- As of March 15, 2029, the maximum lifetime for a TLS certificate will be 47 days.

www.digicert.comTLS Certificate Lifetimes Will Officially Reduce to 47 DaysThe CA/Browser Forum has officially voted to amend the TLS Baseline Requirements to set a schedule for shortening both the lifetime of TLS certificates.
Public

In the hope that someone here knows more Java than .. asking for a friend ... or something:

Is there a way to get more information from #Java when outbound #TLS connections fail (trust issues, for example)? And I do not want to enable debugging in the JVM; that would give me gigabytes of logs per second (yes, really). I basically want the application to make a connection, see it fail, and then handle that exception cleanly while also picking up precisely what the error was: Unknown CA, expired certificate, invalid usage flags, etc.

I'm clearly not a Java developer, just a sysadmin who is really frustrated with the extremely unhelpful Internet right now. I really don't need to be told "just turn off validation" or "just use ...javax.net.debug".

pleroma.anduin.netAnduin.net
Public

System Administration

Week 8, The Simple Mail Transfer Protocol, Part II

In this video, we observe the incoming mail on our MTA, look at how STARTTLS can help protect information in transit, how MTA-STS can help defeat a MitM performing a STARTTLS-stripping attack, and how DANE can be used to verify the authenticity of the mail server's certificate.

youtu.be/RgEiAOKv640

youtu.be- YouTubeEnjoy the videos and music you love, upload original content, and share it all with friends, family, and the world on YouTube.
Public

So after listening to your feedback, I agree: let’s spend that money in the EU to create a publicly-owned, free and open ACME-compatible certificate authority.

See post quoted below, with links to Tom’s work as he’s already been thinking/working on this.

#EU #ACME #TLS #security #LetsEncrypt #technologyCommons #SmallTech mamot.fr/@tdelmas/114224564125

Mamot - Le Mastodon de La Quadrature du Net Tom (@tdelmas@mamot.fr)@aral@mastodon.ar.al Or let's use the protocol they created - ACME - to create more independent CA, EU-based ! https://github.com/tdelmas/Let-s-Clone
Public

🚨 Let’s Encrypt at risk from Trump cuts to OTF: “Let’s Encrypt received around $800,000 in funding from the OTF”

Dear @EUCommission, get your heads out of your arses and let’s find @letsencrypt €1M/year (a rounding error in EU finances) and have them move to the EU.

If Let’s Encrypt is fucked, the web is fucked, and the Small Web is fucked too. So how about we don’t let that happen, yeah?

(In the meanwhile, if the Let’s Encrypt folks want to make a point about how essential they are, it might be an idea to refuse certificates to republican politicians. See how they like their donation systems breaking in real time…)

CC @nlnet @NGIZero@mastodon.xyz

#USA #fascism #OpenTechFund #LetsEncrypt #SSL #TLS #encryption #EU #web #tech #SmallWeb #SmallTech mastodon.social/@publictorsten

Mastodonpublictorsten (@publictorsten@mastodon.social)Wenn Let’s Encrypt plötzlich nicht mehr klappt, wird das halbe Internet aus Zertifikatsfehlern bestehen. https://www.heise.de/news/Nach-Trump-Dekret-Kampf-um-US-Foerdermittel-fuer-Tor-F-Droid-und-Let-s-Encrypt-10328226.html
Public

So, apparently, it is no longer possible to require #HTTPS client certificate authentication for a specific subtree when using #TLS 1.3, because renegotiation is no longer supported and there is no replacement protocol for “hey client, if you want to go in there, I'm gonna need to see your certificate first.”

Lovely. I was using that. 🤦‍♂️