I think it’s a good idea, everyone should be automating this anyway.

  • @SirMaple__
    link
    English
    5
    edit-2
    2 hours ago

    I manage all my certs using Cert Warden which has a dashboard that displays the expiry date. It does lack alerting, so I use Uptime-kuma to monitor the expiry dates of the certs. So not a big loss for me.

  • @[email protected]
    link
    fedilink
    English
    154 hours ago

    Providing expiration notifications costs Let’s Encrypt tens of thousands of dollars per year

    Not doubting them, but I don’t understand how that’s possible.

    Storing the email addresses and expiration dates takes an irrelevant amount of storage space, even if they had billions of cutomers.

    Sending the emails should also not cost thousands, even if a significant amount of customers regularly let their certificates expire (which hopefull isn’t the case).

    So where are the tens of thousands of yearly costs coming from?

    • @[email protected]
      link
      fedilink
      English
      184 hours ago

      As with all things email, they probably really wanted to make sure that the mails were delivered and thus were using a commercial MTA to ensure that.

      I’d wager, even at 20 or 30 or 40k a year, that’s way less than it’d cost to host infra and have at least two if not three engineers available 24/7 to maintain critical infra.

      Looking at my mail, over the years I’ve gotten a couple hundred email from them around certificates and expirations (and other things), and if you assume there’s a couple million sites using these certs, I could easily see how you’d end up in a situation where this could scale in cost very very slowly, until it’s suddenly a major drain.

    • @[email protected]
      link
      fedilink
      English
      74 hours ago

      If they send 2 emails per subdomain per year, that could easily be 10s of millions which would make the cost per email measured in thousandths of a cent. And I could see the number of subdomains being larger by a factor of 10, maybe more.

      Another angle: someone with IT experience needs to manage the system that seems emails, and other engineers need to integrate other systems with the email reminder system. The time spent on engineering could easily add up to thousands per year, if not tens of thousands.

      I’m guessing their figure is based on both running costs and engineering costs.

    • @[email protected]
      link
      fedilink
      English
      3
      edit-2
      4 hours ago

      Transactional email services are about $15 per 10,000 emails. I’ll round down to $10 to consider b2b deals and let’s just say it’s $10,000 per year. That would be like idk 84k emails a month.

      Keep in mind this doesn’t consider the DB hosting and the processing of expiring emails and salaries, so yeah, I could see it.

      Edit: before anyone yells at me. I can’t math.

    • @[email protected]
      link
      fedilink
      English
      24 hours ago

      I just realized I have no idea who pays for Let’s Encrypt. I just run the server commands, automate it, and move on.

  • Ebby
    link
    fedilink
    English
    707 hours ago

    Those emails have warned me something was pooched in advance many times. I do find them useful.

    Sad to see them go, but nice they mention an alternative.

    • @[email protected]
      link
      fedilink
      English
      177 hours ago

      Pretty much all monitoring solutions on the market track cert expiration nowadays. I get an alert when any of my certs have <5 days left

      • @a_fancy_kiwi
        link
        English
        24 hours ago

        What monitoring solution do you use? I need to set something up for my own projects but haven’t gotten around to it. Any experience with Nagios?

        • @[email protected]
          link
          fedilink
          English
          12 hours ago

          I use NewRelic myself. They are software agnostic and only connect to your URL to get the expiration date.

          If you set up LE correctly, it should never get an alert. I haven’t been alerted since I set it up, to the point that I wonder if I set up the monitor correctly.

          The only thing I wish it could do is use custom ports. I have some services running on non standard ports.

  • Eskuero
    link
    fedilink
    English
    157 hours ago

    I did setup UptimeKuma for notifications on this. let’s see if it works out when the expiry arrives in a month

    • MaggiWuerze
      link
      fedilink
      English
      36 hours ago

      I think I’ll need to add notifications for my uptime kuma as well now. So far I’ve used it mostly for historical data but without the mails, I would like to get a notice

  • @[email protected]
    link
    fedilink
    English
    96 hours ago

    I think it’s a good idea, everyone should be automating this anyway.

    This is still not possible in all scenarios. For example, wildcard certificates for DNS providers with no API support.

      • @[email protected]
        link
        fedilink
        English
        26 hours ago

        There are a lot of embedded systems that do not offer API support to swap out certificates. Things like switches, dvr, nas devices, etc.

        • @[email protected]
          link
          fedilink
          English
          56 hours ago

          Honestly in rare situations that a device like that needs to be accessible from the wild Internet I think it’d be mad to expose it directly, especially if it’s not manageable as you suggest. At the very least, I’d be leaning on a reverse proxy.

          • @[email protected]
            link
            fedilink
            English
            46 hours ago

            That implies though I don’t want valid certificates in my environment. I still want to make sure even on my private network I’m using valid certs. A lot of security departments require that too even if the device isn’t public facing.

            • @[email protected]
              link
              fedilink
              English
              24 hours ago

              I’m with you, but that’s why I’m automating certificate expiry checking somewhere else (in my home assistant install to be exact).

            • @[email protected]
              link
              fedilink
              English
              55 hours ago

              Valid certificate is anything you trust. Any CA which you can trust is no more or less secure than the one you get from LE, so for the private network you can just happily sign your own certificates and just distribute the CA to your devices.

              • @[email protected]
                link
                fedilink
                English
                14 hours ago

                But then you have to distribute CAs to all the devices that will reach this service, and not all devices allow that.

                • @[email protected]
                  link
                  fedilink
                  English
                  12 hours ago

                  True. And there’s also a ton of devices around which don’t trust LetsEncrypt either. There’s always edge cases. For example, take a bit older photocopier and it’s more than likely that it doesn’t trust on anything on this planet anymore and there’s no easy way to update CA lists even if the hardware itself is still perfectly functional.

                  That doesn’t mean that your self-signed CA, in itself, would be technically any less secure than the most expensive Verisign certificate you can find. And yes, there’s a ton of details and nuances here and there, but I’m not going to go trough every technical detail about how certificates work. I’m not an expert on that field by any stretch even if I do know a thing or two and there’s plenty of material online to dig deep into the topic if you want to.

            • @cm0002
              link
              English
              35 hours ago

              still want to make sure even on my private network I’m using valid certs. A lot of security departments require that too even if the device isn’t public facing.

              Is there a hard source with evidence that this is at all needed? Because there are a lot of things that “security departments” do that amount to security theater. Like forcing arbitrary password changes org wide.

              • @[email protected]
                link
                fedilink
                English
                25 hours ago

                Regardless of “hard evidence” it’s still the company policy. How well does it go over if you try to say “well acktuslly…” when it comes to password changes.

                • @cm0002
                  link
                  English
                  35 hours ago

                  How well does it go over if you try to say “well acktuslly…” when it comes to password changes.

                  Well, it went over easy, but I also gained the authority to implement or toss such policies when I took my job LMAO

                  In any case, I was referring to the “my environment” part since it implied you had such authority and were just choosing to emulate policies of others, ofc I don’t mean to make decisions you don’t have the authority to. Hard evidence is hard evidence though, it does give you a leg to stand on should you propose such changes

  • Kokesh
    link
    English
    76 hours ago

    I just wish I wouldn’t have to renew certs so often.

  • @Jimmycakes
    link
    English
    26 hours ago

    Mine just auto renews anyway