NameSilo

Selling Epik and #1 SSL CA Sectigo (formerly Comodo SSL) partner. DNEncrypt to be Intermediate CA.

Spaceship Spaceship
Watch
Status
Not open for further replies.

INFJ

I.T. Infrastructure EngineerTop Member
Impact
415
Great news everyone!

Yesterday, Epik entered into a 2 year operating agreement with SSL market leader Sectigo (formerly Comodo SSL) to become an intermediate certificate authority to issue SSL certificates across all brands of Epik Holdings, Inc.

This will allow all sites in the SSL lander network to be equipped with Domain Validated (DV), Extended Validated (EV) or Organization Validated (OV) certificates instead of the current LetsEncrypt certificates.

This is important because we don't know for how much longer LetEncrypt will allow the creation of bulk SSL certificates to produce SSLs for free at will, even for organizations with lots of IPv4's as we have.

We also don't know whether major search engines will start to view LetsEncrypt certificates as being less compelling as an authority signal versus a paid cert.

More announcements coming, but for now, this give us a 2 year window to become a full Root CA while delivering on the vision for DNEncrypt as an alternative to LetsEncrypt.

Please let me know if you have any questions.

Tin Nguyen

@Rob Monster
 
25
•••
The views expressed on this page by users and staff are their own, not those of NamePros.
Honestly, I don't like any of them.
 
2
•••
Honestly, I don't like any of them.

Same.

I'm no branding guru, but as I look at the options I'm led to ask, is an icon necessary? Epik doesn't have one. Comodo doesn't have one. We can all think of other examples. I understand the value of such graphics when they serve a clear purpose. Pepsi has a prominent logo on their cans that are as much as an advertisement to others as they are a means by which consumers can easily find their products on shelves. When you hold a Pepsi can, you let others know you are a Pepsi drinker, not a Coke drinker; there are subtle messages conveyed by the logo, both to the consumer and by the consumer. Graphics are valuable additions to logos when they add to the brand's perceived quality, or tell a story about the brand that isn't inherently provided in the name of the brand alone. I don't see any value in adding a graphic to DN Encrypt. It's redundant to place a lock icon next to the word Encrypt. To do so makes it look like you're trying too hard to sell it. A nice firm font-driven logo, like Comodo's, would suit the brand best imo.
 
3
•••
Same.

I'm no branding guru, but as I look at the options I'm led to ask, is an icon necessary? Epik doesn't have one. Comodo doesn't have one. We can all think of other examples. I understand the value of such graphics when they serve a clear purpose. Pepsi has a prominent logo on their cans that are as much as an advertisement to others as they are a means by which consumers can easily find their products on shelves. When you hold a Pepsi can, you let others know you are a Pepsi drinker, not a Coke drinker; there are subtle messages conveyed by the logo, both to the consumer and by the consumer. Graphics are valuable additions to logos when they add to the brand's perceived quality, or tell a story about the brand that isn't inherently provided in the name of the brand alone. I don't see any value in adding a graphic to DN Encrypt. It's redundant to place a lock icon next to the word Encrypt. To do so makes it look like you're trying too hard to sell it. A nice firm font-driven logo, like Comodo's, would suit the brand best imo.

I've been trying to really nail what I'm trying to convey. I think this is it:

DN Encrypt is serious business, not some off-the-shelf consumer good. You want to convey that you take yourself seriously. Let the quality of your product, alone, be what speaks to the quality of the brand, not some pretty image. SSL is serious business. Look serious.
 
4
•••
old logo before a rebrand
comodo-logo.png

New logo after a rebrand
sectigo_trust_seal_lg_2x.png

Why Use a Sectigo Trust Seal
https://ssl.comodo.com/site-seal

Regards
 
Last edited:
4
•••
old logo before a rebrand
Show attachment 138998
New logo after a rebrand
sectigo_trust_seal_lg_2x.png

Why Use a Sectigo Trust Seal
https://ssl.comodo.com/site-seal

Regards

Fair point. Notice that the old graphics are not pretty and whimsical. Perhaps they spoke to audiences of a time gone by, and the companies chose to remove the artwork for a reason. ...that reason being that the brands were better off without the art.

The graphics proposed look more modern, for sure. But they also look friendly. Neither of the examples above look friendly.
 
Last edited:
2
•••
When it comes to vulnerability ... nothing Is scarier :)
 
0
•••
Same.

I'm no branding guru, but as I look at the options I'm led to ask, is an icon necessary? Epik doesn't have one. Comodo doesn't have one. We can all think of other examples. I understand the value of such graphics when they serve a clear purpose. Pepsi has a prominent logo on their cans that are as much as an advertisement to others as they are a means by which consumers can easily find their products on shelves. When you hold a Pepsi can, you let others know you are a Pepsi drinker, not a Coke drinker; there are subtle messages conveyed by the logo, both to the consumer and by the consumer. Graphics are valuable additions to logos when they add to the brand's perceived quality, or tell a story about the brand that isn't inherently provided in the name of the brand alone. I don't see any value in adding a graphic to DN Encrypt. It's redundant to place a lock icon next to the word Encrypt. To do so makes it look like you're trying too hard to sell it. A nice firm font-driven logo, like Comodo's, would suit the brand best imo.

I agree. It depends. Using an icon can do wonders for brand recognition whereas a typography based logo could be really strong. But you know, it depends on the branding, vision, message you want to convey, etc. Lots to factor in, like some of the fine examples you stated.

Comodo is a fine example as well. Their custom typeface is what I remember. The icon not so much. Not bad but not really special either. Now the (new) sectigo icon is better. I like it, it's simple, but I take issues with their brand. It's not all bad but for some reason I keep mistaking it for sertigo/certigo. sertigo still available at regfee for some reason. Say certigo, sectigo sertigo and repeat that a couple of times. Do you still recall what the right brandname is? I'd secure it for brand protection, no questions asked.

Back to DNE. I'm not a fan of the name to start with, I don't like the flow of it as it is pronounced with two consecutive /e/ /n/ sounds. It kinds breaks up the name if you get what I'm saying. The DN part is something I don't understand at all. It's not on point with the product. DNE is not just websites/domains, it's an intermediate CA. Securing HTTP with SSL is at core just a small part of this.

Even if you wouldn't link the DN abbreviation to domains (I reckon non domainers won't that easily), what is the brand here (as shown in the logotype)? Is it an abbreviation (DNE) followed by ncrypt? It would make sense if you used DNE all in caps, and ncrypt would work as alternative spelling for encrypt. But that way the abbreviation wont make sense. Still... It may be nitpicking but this is something you should really tackle right away when you establish a brandname. It's a weaker choice but it is what it is... imo.

As for the proposed logos visually. Most of them are unbalanced, weird kerning and tracking. Basically way too generic. I like A6 somewhat but I dont think the icon is that well done or really holds some meaning, I'm with you on that. And yeah, don't try too hard.

On the brightside... look at what most of the competition is using. They must have let the intern create it or it must have been a monday morning of friday afternoon design job :).

Just my opinion, the project itself is actually pretty cool :)
 
3
•••
It is what is :) but a very Good points @NameDeck
btw. Sectigo logo / symbol contains C [upper part] (for Comodo) , followed by cut off D (secureD), forming a free style Letter S. (Comodo)secureD by Sectigo

Regards
 
3
•••
It is what is :) but a very Good points @NameDeck
btw. Sectigo logo / symbol contains C [upper part] (for Comodo) , followed by cut off D (secureD), forming a free style Letter S. (Comodo)secureD by Sectigo

Regards

yeah I think I read something along those lines about their rebranding but did't bother to bookmark for some reason :). It's a nice touch and I like that they were able to maintain a link to their past in the symbol and give it meaning.

It caught my eye as at the time, just before they rebranded, I abandoned a proposal with a very similar name and somewhat related niche (but more like wesite security audits).
 
1
•••
After the problem has been identified by @NameDeck and @Bernard Wright , it is important to fully define a strategy to solve the problem :) Let's start with the basic :)

dnencrypt.jpg
 
3
•••
2
•••
1
•••
I agree. It depends. Using an icon can do wonders for brand recognition whereas a typography based logo could be really strong. But you know, it depends on the branding, vision, message you want to convey, etc. Lots to factor in, like some of the fine examples you stated.

Comodo is a fine example as well. Their custom typeface is what I remember. The icon not so much. Not bad but not really special either. Now the (new) sectigo icon is better. I like it, it's simple, but I take issues with their brand. It's not all bad but for some reason I keep mistaking it for sertigo/certigo. sertigo still available at regfee for some reason. Say certigo, sectigo sertigo and repeat that a couple of times. Do you still recall what the right brandname is? I'd secure it for brand protection, no questions asked.

Back to DNE. I'm not a fan of the name to start with, I don't like the flow of it as it is pronounced with two consecutive /e/ /n/ sounds. It kinds breaks up the name if you get what I'm saying. The DN part is something I don't understand at all. It's not on point with the product. DNE is not just websites/domains, it's an intermediate CA. Securing HTTP with SSL is at core just a small part of this.

Even if you wouldn't link the DN abbreviation to domains (I reckon non domainers won't that easily), what is the brand here (as shown in the logotype)? Is it an abbreviation (DNE) followed by ncrypt? It would make sense if you used DNE all in caps, and ncrypt would work as alternative spelling for encrypt. But that way the abbreviation wont make sense. Still... It may be nitpicking but this is something you should really tackle right away when you establish a brandname. It's a weaker choice but it is what it is... imo.

As for the proposed logos visually. Most of them are unbalanced, weird kerning and tracking. Basically way too generic. I like A6 somewhat but I dont think the icon is that well done or really holds some meaning, I'm with you on that. And yeah, don't try too hard.

On the brightside... look at what most of the competition is using. They must have let the intern create it or it must have been a monday morning of friday afternoon design job :).

Just my opinion, the project itself is actually pretty cool :)

Yes, good points.

As for the name, that ship did sail. At the time we had just named DNProtect.com for an upcoming domain risk-scoring and insurance product. So, the DNEncrypt brand seemed like a logical brand extension. A few weeks later @Tin Nguyen came on board as Product Manager.

@Ala Dadan and @Tin Nguyen are chipping away at the site but the real work is in standing up the API provisioning software for issuing SSL at scale with secure key management. We have more than 200,000 SSL-secured domains live now. Lets Encrypt has issued about 850 million certs.

Keep in mind that DNEncrypt started out as a bootstrap project to explore becoming a Root CA. We then completed a multi-year deal with Sectigo and now here we are: a few weeks from releasing (unleashing?) an alternative to LetsEncrypt using commercial DA certs that can be issued at scale.

When it comes to challenging LetsEncrypt, useful read here:

https://medium.com/swlh/why-lets-encrypt-is-a-really-really-really-bad-idea-d69308887801

It is interesting to see people beginning to talk about the downside of LetsEncrypt. I think the real downside is that we don't actually know who owns it or governs it. That seems to be a black box.

When it comes to things like whether, how, and under what conditions data gets routed, ownership and governance matters a lot.

Now think for a moment about all the pour souls who tried Ashley Madison, and then one day, oopsie, the member rosters were leaked. Some went so far as to call it a honeypot.

So, one day imagine we wake up to discover that LetsEncrypt's keys were compromised. Oopsie-daisy. It was all free so any losses that anyone would incur would be without protection.

The ToS of LetsEncrypt are worth a read. Basically if there is an oopsie, well, sucks to be you. '

See if you can download the full PDF of the current ToS from their website. It should be easy. It is not but you can piece it together from other documents on their site. You will find segments like this:

upload_2019-12-14_17-45-49.png

To be fair, if you paid nothing, you probably should not expect much in terms of legal protection. On the other hand, consider the possibility that LE was all just a giant setup for the eventual oopsie.

As I see it, right now there appear to be a lot of fragile eggs in someone's basket. If that one single encryption key suddenly is compromised, there are a lot of drippy bags.

Does it sound far-fetched that LetsEncrypt would already have encryption backdoors or that the key could one day be compromised? No, not really. See here:

https://www.politico.com/story/2019/06/27/trump-officials-weigh-encryption-crackdown-1385306

Just as "law enforcement" wants a backdoor for WHOIS RDAP to pierce the privacy veil at will, it would be not crazy to assume that similar organizations expect the same for (free) SSL/TLS.

Just as Epik WHOIS privacy being real for law-abiding entities, I believe the goal with DNEncrypt should also be real encryption for law-abiding entities.

As for the obvious case of a domain that breaks the law, I believe our policy should be simply to block those domains from being able to use the SSL issuance service. We'll see how that goes.

The SSL/TLS area is pretty fascinating. I am glad we initiated exploratory work in this area of the internet delivery value chain. There might be more here than I expected to find.
 
Last edited:
6
•••
@Rob Monster

As always, thank you for your elaborate respons.

Regarding DNEncrypt, I agree. It is what it is. Projects evolve continuesly and It's nice to see it taking shape through an organic process. I didn't realise the certification went live already, congrats. As for branding etc, a great product sells itself, everything else is dressup and the possibility of a rebrand sometimes actually works as it can give you extra press exposure in the future ;).

I think you know my stance on Letsencrypt. It's a good thing more people are starting to look into the downside of using Letsencrypt, I 100% agree. All major çompanies (or foundations for that matter) that hold a 'monopoly' in a certain area should be watched closely. That TOS issue is somewhat problematic (could be more transparant). For people who are interested, spend some time reading their repository. Most you'll want to know is there.

As for the obvious case of a domain that breaks the law, I believe our policy should be simply to block those domains from being able to use the SSL issuance service. We'll see how that goes.

The SSL/TLS area is pretty fascinating. I am glad we initiated exploratory work in this area of the internet delivery value chain. There might be more here than I expected to find.

Interesting concept. Do you know if this is done so already by other CAs? I'm pretty sure non secure conncections will be blocked by a lot of services in the near future. It will most definitely work.

However, one of my concerns is that eventyally this will lower the bar for issuers to silence free speech at their sole discretion. Not sure how I feel about it yet but worth it to explore. Fascinating indeed!
 
1
•••
@Rob Monster

As always, thank you for your elaborate respons.

Regarding DNEncrypt, I agree. It is what it is. Projects evolve continuously and It's nice to see it taking shape through an organic process. I didn't realise the certification went live already, congrats. As for branding etc, a great product sells itself, everything else is dressup and the possibility of a rebrand sometimes actually works as it can give you extra press exposure in the future ;).

I think you know my stance on Letsencrypt. It's a good thing more people are starting to look into the downside of using Letsencrypt, I 100% agree. All major çompanies (or foundations for that matter) that hold a 'monopoly' in a certain area should be watched closely. That TOS issue is somewhat problematic (could be more transparent). For people who are interested, spend some time reading their repository. Most you'll want to know is there.



Interesting concept. Do you know if this is done so already by other CAs? I'm pretty sure non secure connections will be blocked by a lot of services in the near future. It will most definitely work.

However, one of my concerns is that eventually this will lower the bar for issuers to silence free speech at their sole discretion. Not sure how I feel about it yet but worth it to explore. Fascinating indeed!

The legal entity DNEncrypt, Inc is formed. The intermediate root certificate order has been submitted. That approval process apparently takes weeks.

The Subca is for both RSA and ECC as follows:

DNEncrypt SHA2 Domain Secure Site CA - DV

DNEncrypt SHA2 Business Secure Site CA - OV

DNEncrypt SHA2 Extended Validation Secure Site CA - EV

DNEncrypt ECC Domain Secure Site CA - DV

DNEncrypt ECC Business Secure Site CA - OV

DNEncrypt ECC Extended Validation Secure Site CA - EV

A rebrand would cost quite a bit at this point so we'll proceed with the name and tinker around the aesthetic edges while focusing on the user experience for single cert and bulk API provisioning.

The nitty-gritty of who has access to the private key will be managed by trusted security engineers whose identities will be known to me but will not be openly discussed in forums. I won't have access to it.

The free version will be 90 day certs. The paid versions will be up to 2 years. I expect we'll introduce a Forever option where we manage the re-issuance process.
 
3
•••
The legal entity DNEncrypt, Inc is formed. The intermediate root certificate order has been submitted. That approval process apparently takes weeks.

The Subca is for both RSA and ECC as follows:

DNEncrypt SHA2 Domain Secure Site CA - DV

DNEncrypt SHA2 Business Secure Site CA - OV

DNEncrypt SHA2 Extended Validation Secure Site CA - EV

DNEncrypt ECC Domain Secure Site CA - DV

DNEncrypt ECC Business Secure Site CA - OV

DNEncrypt ECC Extended Validation Secure Site CA - EV

A rebrand would cost quite a bit at this point so we'll proceed with the name and tinker around the aesthetic edges while focusing on the user experience for single cert and bulk API provisioning.

The nitty-gritty of who has access to the private key will be managed by trusted security engineers whose identities will be known to me but will not be openly discussed in forums. I won't have access to it.

The free version will be 90 day certs. The paid versions will be up to 2 years. I expect we'll introduce a Forever option where we manage the re-issuance process.

Sweet, looking good. Good call on not disclosing engineers etc for security. Thanks for the quick update. There's too much Epik projects being worked on to notice every update.

Keep the fire burning ;)
 
1
•••
Not covfefe. Sorry, I'm not thinking in English :) It seems I translated the phrase wrong. I simply meant the The Klondike Gold Rush - Canada, between years 1896 and 1900, gold "fever" or whatever was it called. And added it as adjective implying "golden, perfect, great" with the "Surveillance" noun.
I like Surveillance Klondike better, now I know what you meant. Anything that is gold. Totally klondike.
 
Last edited:
2
•••
The legal entity DNEncrypt, Inc is formed.
So, how much for a normal 2-years dnencrypt domain validated cert.? ;) Just one domain. And, another option - wildcard.
 
0
•••
So, how much for a normal 2-years dnencrypt domain validated cert.? ;) Just one domain. And, another option - wildcard.

We are still reviewing pricing but will be very competitive. When retail customers come to get the free cert, the paid options will be presented alongside. The UX is under development in parallel to the API. It is a significant project -- a bit bigger than planned but I believe a worthy one. Our intermediate root CA should be cut before year-end, at which point we can start issuing certs to replace LetsEncrypt. @Tin Nguyen and @Ala Dadan should have a preview of the site to share shortly. We have a few more surprises in store.
 
1
•••
We are still reviewing pricing but will be very competitive.
GoDaddy: $63.99 /yr. and NameCheap: $7.88 /yr. It is for 1 DV cert. (not a wildcard). Individual discounts are likely available in both cases. One would guess that GoDaddy is able to sell some charging ~9 times more. Since I am not a big fan of letsencrypt, and prefer to have normal 2-years certs, something <$10 per domain per year for the simpliest 1-domain dv cert. sounds OK for my needs. Which is what I am paying now (if a real website needs to be "secured", not a domain-for-sale lander). Many other users are of similar opinion, so there is still a market for normal certs even with free cpanel/directadmin/etc certibot addons offering good automation for free certs.
When retail customers come to get the free cert
Did you say free? ;) Must be for epik-regged domains?
 
0
•••
GoDaddy: $63.99 /yr. and NameCheap: $7.88 /yr. It is for 1 DV cert. (not a wildcard). Individual discounts are likely available in both cases. One would guess that GoDaddy is able to sell some charging ~9 times more. Since I am not a big fan of letsencrypt, and prefer to have normal 2-years certs, something <$10 per domain per year for the simpliest 1-domain dv cert. sounds OK for my needs. Which is what I am paying now (if a real website needs to be "secured", not domain-for-sale lander). Many other users are of similar opinion, so there is still a market for normal certs even with free cpanel/directadmin/etc certibot addons offering good automation for free certs.

Did you say free? ;) Must be for epik-regged domains?

Commercial DV 90-day certs will be FREE.

It will compete directly with LetsEncrypt.

The upsell is to the paid certs.

Details on the pricing to follow soon. We actually need to move some volume on paid certs because of quarterly "take or pay" commitments with Sectigo.
 
2
•••
Commercial DV 90-day certs will be FREE
You'll need to offer some automation tools then, such as directadmin / cpanel / whatever addons. It is hard to imagine a webmaster doing manual ssl installation 4 times a year...
 
0
•••
You'll need to offer some automation tools then, such as directadmin / cpanel / whatever addons. It is hard to imagine a webmaster doing manual ssl installation 4 times a year...

Yup, and on Epik-hosted sites, that will be easy.

For non-Epik sites, we are looking at introducing an ACME-style provisioning API. Sectigo has given us a lot to work with so this is just more for the API library:

https://docs.userapi.epik.com/v2/

Also, check out this sneak preview:

https://cloudchase.com/

It is Epik's answer to AWS and Azure. OpenStack hosting powered by Epik.

You will be seeing some bundling of tech elements like few have seen elsewhere.

The pieces are falling into place.
 
3
•••
2
•••
0
•••
Status
Not open for further replies.
  • The sidebar remains visible by scrolling at a speed relative to the page’s height.
Back