this post was submitted on 27 May 2024
857 points (96.6% liked)

Programmer Humor

32398 readers
570 users here now

Post funny things about programming here! (Or just rant about your favourite programming language.)

Rules:

founded 5 years ago
MODERATORS
 
you are viewing a single comment's thread
view the rest of the comments
[–] markstos@lemmy.world 3 points 5 months ago (1 children)

If you use the AWS load balancer product or their certificates, they have access to the private key, regardless of whether you forward traffic from the LB to the container over HTTPS or not.

If you terminate the SSL with your own certificate yourself, Amazon still installs the SSM agent by default on Linux boxes. That runs as root and they control it.

If you disable the SSM agent and terminate SSL within Linux boxes you control at AWS, then I don’t think they can access inside your host as long as you are using encrypted EBS volumes encrypted with your key.

[–] CanadaPlus@lemmy.sdf.org 1 points 5 months ago (1 children)

Obviously, I've never actually done this. Good to know.

I'm starting to worry that HTTPS is entirely fake - in the sense that it's purely decorative encryption that protects an insignificant part of the transaction. Like, maybe by design. The NSA's been doing something all these years.

[–] markstos@lemmy.world 1 points 5 months ago (1 children)
[–] CanadaPlus@lemmy.sdf.org 1 points 5 months ago

When used as intended, yes. What I mean is that in practice it may have been weakened, by promotion of services that use it in ways far from best security practices.