Using normal tls certificates with gemini
acdw
acdw at acdw.net
Mon Sep 21 20:36:22 BST 2020
On 2020-09-21 (Monday) at 19:04, Alex // nytpu <alex at nytpu.com> wrote:
> Hey everybody,
>
> For my gemini capsule's tls setup, I just used my Let's Encrypt
> certificate since I already had it set up for my web site. However,
> after reading deeper into server setup with gemini, I discovered that
> I'm probably adding a lot of extra request overhead by using a
> certificate from a CA instead of self-signed. Now my problem is that if
> I change out the certificate, then people that have previously visited
> my site may think it is compromised because the certificate changed and
> most clients are TOFU. Should I change out the certificate or is it fine
> to leave it as is?
IMHO, you're fine as-is. I think I changed out breadpunk.club's cert when the Let's Encrypt one for HTTPS updated/changed, but I don't think you have to worry about it til then, if even then. There might be more advanced statistics for who has a full cert vs. self-signed around somewhere, though.
>
> As an additional question, if I was writing a more advanced gemini
> client, should I validate cert chains if they're availaible or only use
> TOFU on the fingerprint and ignore chains entirely? The spec just says
> to validate however you want, but what's the community's recommendation?
Again, IMHO, but I'd just do TOFU validation on the fingerprint ... unless you want to maybe be the *most* advanced gemini client out there!
--
~ acdw
acdw.net | breadpunk.club/~breadw
More information about the Gemini
mailing list