mod_md VS certificate-transparency

Compare mod_md vs certificate-transparency and see what are their differences.

InfluxDB - Power Real-Time Data Analytics at Scale
Get real-time insights from all types of time series data with InfluxDB. Ingest, query, and analyze billions of data points in real-time with unbounded cardinality.
www.influxdata.com
featured
SaaSHub - Software Alternatives and Reviews
SaaSHub helps you find the best software and product alternatives
www.saashub.com
featured
mod_md certificate-transparency
3 11
330 855
- -
6.6 0.0
25 days ago 9 months ago
C C++
Apache License 2.0 Apache License 2.0
The number of mentions indicates the total number of mentions that we've tracked plus the number of user suggested alternatives.
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.

mod_md

Posts with mentions or reviews of mod_md. We have used some of these posts to build our list of alternatives and similar projects. The last one was on 2023-06-15.
  • Ask HN: What should a Alternative to LetsEncrypt offer
    1 project | news.ycombinator.com | 11 Apr 2024
    There's already other CAs that (optionally) use ACME to issue. As I understand it from the mod_md readme [1], Buypass basically works (without must staple), Sectigo and ZeroSSL work too, but require an account to be setup.

    Are these true alternatives? If not, why not? I don't know where these companies reside.

    [1] https://github.com/icing/mod_md?tab=readme-ov-file#known-iss...

  • Let's Encrypt Acme API Outage
    5 projects | news.ycombinator.com | 15 Jun 2023
    Apache mod_md has fallback too, https://github.com/icing/mod_md#acme-failover I'm just a user, not the author, and I didn't try the fallback. I'm more worried about stuff breaking if I switch issuers than certs expiring without me noticing. I've got some embedded junk that hits my website and has weak cert validation, so better to stick with something that works.
  • Making my websites work as http(s)
    1 project | /r/apache | 19 Jul 2021
    Add mod_md to your apache configuration

certificate-transparency

Posts with mentions or reviews of certificate-transparency. We have used some of these posts to build our list of alternatives and similar projects. The last one was on 2023-08-21.
  • Google Pixel Binary Transparency: verifiable security for Pixel devices
    2 projects | news.ycombinator.com | 21 Aug 2023
    Recently I developed a presentation about immutability as a design concept in computer security. As part of it, I have slides which cover Certificate Transparency implementation[0], which uses Trillian[1] as a distributed ledger. Part of Trillian's documentation includes a Firmware Transparency[2] example. For the year or so I've been aware of it, I've thought that it's a great idea, and wondered if it would ever grow as a project/practice. Digging through the links in this announcement, it appears Trillian is the basis for the distributed ledger here. Glad to see the idea has been taken further by Google.

    [0] https://certificate.transparency.dev/

    [1] https://transparency.dev/

    [2] https://github.com/google/trillian-examples/tree/master/bina...

  • Google and HTTP
    2 projects | news.ycombinator.com | 4 Jul 2023
    > They could say that your certificate passes validation while, in fact, said security has been already tampered with on your side, giving your website's visitors a sense of false security.

    This isn't how the Web PKI works. In order to tamper with your site's traffic, Let's Encrypt (or another CA) would need to issue another certificate for your site with a key that they (rather than you) control. This would be detected via CT[1], which your browser (unless it's Firefox) is already using

    And note: by design, any CA in the trusted set can already do this, regardless of whether you use them or not. The things that are stopping them are that it's (1) not in their interest to do so, (2) it's detectable due to CT, and (3) would result in their root being hell-banned by the browsers.

    [1]: https://certificate.transparency.dev/

  • Let's Encrypt Acme API Outage
    5 projects | news.ycombinator.com | 15 Jun 2023
    You are correct: https://github.com/google/certificate-transparency/blob/mast...

    You can embed CT attestations (SCTs) in the certificate itself, so yes, provided the CA is in cooperation with CT log operators, and deliberately does the pre-certificate -> SCTs -> real certificate dance, it is possible for a browser to validate embedded SCTs without an online check.

    However, that assumes that the CA actively does that, they don't have to. Neither does the server. What's compelling them to is _policy_, set by Google and Apple, that their respective browsers won't accept certificates _without_ CT attestations. Google's policy specifically requires that one of the SCTs on a certificate must be a CT log run by Google. Google also controls the list of CT logs that Chrome will consider as valid CT logs, as part of deciding if an SCT is valid. Antitrust, anyone?

    I was trying to make a similar point about Firefox - policy vs code. And rather than saying that it's specifically the CA/Browser Forum setting policy (which it does, but only baseline policy, which does not include CT), each org in the CA/Browser Forum has their own root cert inclusion program with their own policies, that all draw from baseline policy then add to it. You are right, _baseline_ policy does not require CT....

    ... and neither does _Mozilla's_ policy, now I've scanned through it. It actively acknowledges that CT exists (in that it mandates that if you issue a precertificate for CT, you _must_ issue the completed certificate), but it does _not_ require CAs to use CT. In stark contrast to Google and Apple.

    Perhaps this is why they also don't implement CT checking in Firefox?

  • 2024. január 1-től minden magyarnak jár a 'magyarországi' IP-cím
    1 project | /r/hungary | 3 Jun 2023
  • Security for your Homeserver
    4 projects | /r/selfhosted | 5 May 2023
  • We updated our RSA SSH host key
    8 projects | news.ycombinator.com | 24 Mar 2023
  • Can authenticated internet-facing web app be discovered if not indexed by search engines?
    3 projects | /r/AskNetsec | 20 Jan 2023
    My main source is Certificate Transparency, which is kind of a database of TLS certs created so far. But use external tools like Subfinder or Amass.
  • Evidence regarding Ristonia/Windias "FBI seizures"
    1 project | /r/mapleservers | 5 Dec 2022
    Certificates signed by reputable Certificate Authorities (CA's) are publicly logged by projects like googles certificate transparency, the EFF's SSL observatory and a few CA's directly, which can be viewed on websites like https://crt.sh/ and https://ui.ctsearch.entrust.com/. We will use screenshots of the latter service for readability, but you can verify the same information on the first service as well.
  • I make the same mistake too, sometimes.
    3 projects | /r/ProgrammerHumor | 23 Oct 2022
    The one saving grace is that Certificate Transparency makes it so that false issuances are logged. CT is now required by the big 3 browser vendors. CAs caught wrongly issuing certs without good explanation have their CA cert(s) removed or revoked. (Though sometimes more slowly than I'd like.)
  • Does signal have web based interface?
    1 project | /r/signal | 10 Apr 2022
    I'm not sure what you're talking about. I imagine you mean certificate transparency. Certificate transparency is not available on all browsers (FF doesn't support it), and only enables detectong issuance of malicious certificates/misbehaving CAs, but does not prevent the certificate being from being actually used. This means that a compromised CA could still issue malicious certificates and use them to attack many people before anyone notices it and the malicious certificates are revoked.

What are some alternatives?

When comparing mod_md and certificate-transparency you can also consider the following projects:

bitnami-docker-apache - Bitnami Docker Image for Apache

subfinder - Fast passive subdomain enumeration tool.

Apache - Mirror of Apache HTTP Server. Issues: http://issues.apache.org

zlint - X.509 Certificate Linter focused on Web PKI standards and requirements.

yaac - Yet another ACME client: a decoupled LetsEncrypt client

libsqlfs - a library that implements a POSIX style filesystem on top of an SQLite database

Crypt-LE - Crypt::LE - Let's Encrypt / Buypass / ZeroSSL and other ACME-servers client and library in Perl for obtaining free SSL certificates (inc. generating RSA/ECC keys and CSRs). HTTP/DNS verification is supported out of the box, EAB (External Account Binding) supported, easily extended with plugins, easily dockerized.

Caddy - Fast and extensible multi-platform HTTP/1-2-3 web server with automatic HTTPS

HandyAcme - A TypeScript Client implements ACME (RFC 8555)

github-keygen - Easy creation of secure SSH configuration for your GitHub account(s)

certlint - X.509 certificate linter

ssh