diff --git a/content/de/certificates.md b/content/de/certificates.md index 2b068f7852..4e972a84be 100644 --- a/content/de/certificates.md +++ b/content/de/certificates.md @@ -81,7 +81,7 @@ nahtlos erstellen. Das folgende Bild erklärt die Beziehungen zwischen unseren Zertifikaten: -ISRG Key relationship diagram +ISRG Key relationship diagram # OCSP Signiertes Zertifikat diff --git a/content/de/how-it-works.md b/content/de/how-it-works.md index 5b7dbd8fe4..3bd282dea6 100644 --- a/content/de/how-it-works.md +++ b/content/de/how-it-works.md @@ -29,7 +29,8 @@ Neben den Herausforderungen bietet die Let's Encrypt-Zertifizierungsstelle auch
Aufforderung zur Validierung von example.com stellen + src="/images/howitworks_challenge.png" + loading="lazy"/>
Die Agentensoftware erfüllt eine der gestellten Herausforderungen. Nehmen wir an, sie ist in der Lage, die zweite Aufgabe oben auszuführen: Sie erstellt eine Datei in einem angegebenen Pfad auf der Website `http://example.com`. Der Agent signiert die bereitgestellte Nonce ausserdem mit seinem privaten Schlüssel. Nachdem der Agent diese Schritte ausgeführt hat, benachrichtigt er die Zertifizierungsstelle, dass sie zur Validierung bereit ist. @@ -38,7 +39,8 @@ Dann ist es die Aufgabe der Zertifizierungsstelle, zu überprüfen, ob die Auffo
Requesting authorization to act for example.com + src="/images/howitworks_authorization.png" + loading="lazy"/>
Wenn die Signatur über die Nonce gültig ist und die Herausforderungen ausgecheckt werden, ist der durch den öffentlichen Schlüssel identifizierte Agent berechtigt, die Zertifikatsverwaltung für `example.com` durchzuführen. Wir nennen das Schlüsselpaar, dass der Agent ein "autorisiertes Schlüsselpaar" für `example.com` verwendet hat. @@ -53,12 +55,14 @@ Wenn die Let's Encrypt-Zertifizierungsstelle die Anforderung erhält, werden bei
Anfordern eines Zertifikats für example.com + src="/images/howitworks_certificate.png" + loading="lazy"/>
Der Widerruf funktioniert auf ähnliche Weise. Der Agent unterzeichnet eine Sperranforderung mit dem für `example.com` autorisierten Schlüsselpaar, und die Let's Encrypt-Zertifizierungsstelle überprüft, ob die Anforderung autorisiert ist. In diesem Fall werden Sperrinformationen in den normalen Sperrkanälen (z.B. OCSP) veröffentlicht, sodass vertrauende Parteien wie Browser wissen können, dass sie das widerrufene Zertifikat nicht akzeptieren sollten.
Anfrage zum Widerruf eines Zertifikats für example.com + src="/images/howitworks_revocation.png" + loading="lazy"/>
diff --git a/content/de/trademarks.md b/content/de/trademarks.md index 03689d43f1..ab897ec966 100644 --- a/content/de/trademarks.md +++ b/content/de/trademarks.md @@ -266,7 +266,7 @@ dieser Richtlinie haben, können Sie uns gerne unter Unser Standardlogo und Text. Abgesehen von wenigen Ausnahmen ist dies die Standard-Go-To-Version. -

standard logo

+

standard logo

EPS SVG PNG

### Let's Encrypt weit @@ -274,7 +274,7 @@ die Standard-Go-To-Version. Die breite Version unseres Logos und Textes. Verwenden Sie dies in Kontexten, in denen der vertikale Raum begrenzt ist. -

wide logo

+

wide logo

EPS SVG PNG

### Let's Encrypt nur Schlüssel @@ -284,5 +284,5 @@ Encrypt" deutlich sichtbar ist oder an anderer Stelle auf der Seite oder im Design festgelegt wurde. (Verwenden Sie im Zweifelsfall ein anderes Format.) -

Logo only key

+

Logo only key

EPS SVG PNG

diff --git a/content/en/how-it-works.md b/content/en/how-it-works.md index 3057a53a64..cbc7b113d5 100644 --- a/content/en/how-it-works.md +++ b/content/en/how-it-works.md @@ -3,7 +3,7 @@ title: How It Works linkTitle: How Let's Encrypt Works slug: how-it-works top_graphic: 3 -lastmod: 2019-10-18 +lastmod: 2020-10-28 --- {{< lastmod >}} @@ -27,7 +27,8 @@ Along with the challenges, the Let's Encrypt CA also provides a nonce that the a
Requesting challenges to validate example.com + src="/images/howitworks_challenge.png" + loading="lazy"/>
The agent software completes one of the provided sets of challenges. Let's say it is able to accomplish the second task above: it creates a file on a specified path on the `http://example.com` site. The agent also signs the provided nonce with its private key. Once the agent has completed these steps, it notifies the CA that it's ready to complete validation. @@ -36,7 +37,8 @@ Then, it's the CA's job to check that the challenges have been satisfied. The C
Requesting authorization to act for example.com + src="/images/howitworks_authorization.png" + loading="lazy"/>
If the signature over the nonce is valid, and the challenges check out, then the agent identified by the public key is authorized to do certificate management for `example.com`. We call the key pair the agent used an "authorized key pair" for `example.com`. @@ -52,13 +54,15 @@ When the Let's Encrypt CA receives the request, it verifies both signatures
Requesting a certificate for example.com + src="/images/howitworks_certificate.png" + loading="lazy"/>
Revocation works in a similar manner. The agent signs a revocation request with the key pair authorized for `example.com`, and the Let's Encrypt CA verifies that the request is authorized. If so, it publishes revocation information into the normal revocation channels (i.e. OCSP), so that relying parties such as browsers can know that they shouldn't accept the revoked certificate.
Requesting revocation of a certificate for example.com + src="/images/howitworks_revocation.png" + loading="lazy"/>
diff --git a/content/en/post/2016-4-12-leaving-beta-new-sponsors.markdown b/content/en/post/2016-4-12-leaving-beta-new-sponsors.markdown index e181f32301..fd04bc01d1 100644 --- a/content/en/post/2016-4-12-leaving-beta-new-sponsors.markdown +++ b/content/en/post/2016-4-12-leaving-beta-new-sponsors.markdown @@ -13,7 +13,7 @@ Let’s Encrypt is leaving beta today. We’re also excited to announce that fou Since our beta began in September 2015 we’ve issued more than 1.7 million certificates for more than 3.8 million websites. We’ve gained tremendous operational experience and confidence in our systems. The beta label is simply not necessary any more. -

Issuance as of April 10, 2016

+

Issuance as of April 10, 2016

We set out to encrypt 100% of the Web. We’re excited to be off to a strong start, and with so much support across the industry. diff --git a/content/en/post/2016-6-22-https-progress-june-2016.markdown b/content/en/post/2016-6-22-https-progress-june-2016.markdown index 3f7886ce7c..90dd9acda9 100644 --- a/content/en/post/2016-6-22-https-progress-june-2016.markdown +++ b/content/en/post/2016-6-22-https-progress-june-2016.markdown @@ -11,7 +11,7 @@ Our goal with Let’s Encrypt is to get the Web to 100% HTTPS. We’d like to gi Let’s Encrypt has issued more than 5 million certificates in total since we launched to the general public on December 3, 2015. Approximately 3.8 million of those are active, meaning unexpired and unrevoked. Our active certificates cover more than 7 million unique domains. -

Issuance as of June 22, 2016

+

Issuance as of June 22, 2016

A couple of different factors have contributed heavily to this growth. The first is large-scale deployments from companies such as OVH, WordPress.com, Akamai, Shopify, Dreamhost, and Bitly. The second is our ability to serve individual sites globally with a focus on ease-of-use. If we’re going to get to 100% HTTPS we need to reach the “long tail” of the Web, which is in many ways more challenging due to the number of parties involved and widely varying degrees of technical competency. diff --git a/content/en/post/2016-8-5-le-root-to-be-trusted-by-mozilla.markdown b/content/en/post/2016-8-5-le-root-to-be-trusted-by-mozilla.markdown index 9e6906ed0f..2dc6d6ed8b 100644 --- a/content/en/post/2016-8-5-le-root-to-be-trusted-by-mozilla.markdown +++ b/content/en/post/2016-8-5-le-root-to-be-trusted-by-mozilla.markdown @@ -13,7 +13,7 @@ Public CAs need their certificates to be trusted by browsers and devices. CAs th Getting a new root trusted and propagated broadly can take 3-6 years. In order to start issuing widely trusted certificates as soon as possible, we partnered with another CA, IdenTrust, which has a number of existing trusted roots. As part of that partnership, an IdenTrust root “vouches for” the certificates that we issue, thus making our certificates trusted. We’re incredibly grateful to IdenTrust for helping us to start carrying out our mission as soon as possible. -

Chain of trust between Firefox and Let's Encrypt certificates.
Chain of Trust Between Firefox and Let's Encrypt Certificates

+

Chain of trust between Firefox and Let's Encrypt certificates.
Chain of Trust Between Firefox and Let's Encrypt Certificates

However, our plan has always been to operate as an independently trusted CA. Having our root trusted directly by the Mozilla root program represents significant progress towards that independence. diff --git a/content/en/post/2017-1-6-le-2016-in-review.markdown b/content/en/post/2017-1-6-le-2016-in-review.markdown index 298a92e20c..5c8d721517 100644 --- a/content/en/post/2017-1-6-le-2016-in-review.markdown +++ b/content/en/post/2017-1-6-le-2016-in-review.markdown @@ -12,7 +12,7 @@ Our first full year as a live CA was an exciting one. I’m incredibly proud of At the start of 2016, Let’s Encrypt certificates had been available to the public for less than a month and we were supporting approximately 240,000 active (unexpired) certificates. That seemed like a lot at the time! Now we’re frequently issuing that many new certificates in a single day while supporting more than 20,000,000 active certificates in total. We’ve issued more than a million certificates in a single day a few times recently. We’re currently serving an average of 6,700 OCSP responses per second. We’ve done a lot of optimization work, we’ve had to add some hardware, and there have been some long nights for our staff, but we’ve been able to keep up and we’re ready for another year of [strong growth](https://letsencrypt.org/stats/). -

Let's Encrypt certificate issuance statistics.

+

Let's Encrypt certificate issuance statistics.

We added a number of [new features](https://letsencrypt.org/upcoming-features/) during the past year, including support for the ACME DNS challenge, ECDSA signing, IPv6, and Internationalized Domain Names. diff --git a/content/en/post/2017-6-28-hundred-million-certs.markdown b/content/en/post/2017-6-28-hundred-million-certs.markdown index faaa54c6cd..6c01b19374 100644 --- a/content/en/post/2017-6-28-hundred-million-certs.markdown +++ b/content/en/post/2017-6-28-hundred-million-certs.markdown @@ -17,7 +17,7 @@ Third, it illustrates the power of automated certificate management. If getting The total number of certificates we’ve issued is an interesting number, but it doesn’t reflect much about tangible progress towards our primary goal: a 100% HTTPS Web. To understand that progress we need to look at this graph: -

Percentage of HTTPS Page Loads in Firefox.

+

Percentage of HTTPS Page Loads in Firefox.

When Let’s Encrypt’s service first became available, less than 40% of page loads on the Web used HTTPS. It took the Web 20 years to get to that point. In the 19 months since we launched, encrypted page loads have gone up by 18%, to nearly 58%. That’s an incredible rate of change for the Web. Contributing to this trend is what we’re most proud of. diff --git a/content/en/trademarks.md b/content/en/trademarks.md index 214e1d43ee..b9637763de 100644 --- a/content/en/trademarks.md +++ b/content/en/trademarks.md @@ -3,7 +3,7 @@ title: Trademark Policy slug: trademarks top_graphic: 1 date: 2018-09-19 -lastmod: 2018-09-19 +lastmod: 2020-10-28 english_is_canonical: 1 --- @@ -102,19 +102,19 @@ If you’d like to use the ISRG Marks in a way that’s not covered by this poli Our standard logo and text. Outside of a few exceptions, this is the default, go-to version. -

standard logo

+

standard logo

EPS SVG PNG

### Let's Encrypt Wide The wide version of our logo and text. Use this in contexts where vertical space is limited. -

wide logo

+

wide logo

EPS SVG PNG

### Let's Encrypt Lock Only Our logo alone. Use this only when the "Let's Encrypt" word mark is clearly visible or has been well established elsewhere on the page or in the design. (When in doubt, use a different format.) -

lock only logo

-

EPS SVG PNG

\ No newline at end of file +

lock only logo

+

EPS SVG PNG

diff --git a/content/es/certificates.md b/content/es/certificates.md index e7397bde13..fc85a4fa02 100644 --- a/content/es/certificates.md +++ b/content/es/certificates.md @@ -68,7 +68,7 @@ configuración perfectamente. La siguiente imagen explica visualmente las relaciones entre nuestros certificados: -ISRG Key relationship diagram +ISRG Key relationship diagram # Certificado firma OCSP diff --git a/content/es/how-it-works.md b/content/es/how-it-works.md index 70ddc1ea07..01221c347c 100644 --- a/content/es/how-it-works.md +++ b/content/es/how-it-works.md @@ -27,7 +27,8 @@ Junto con los retos, el Let's Encrypt CA también provee un `nonce` que el agent
Solicitando retos para validar example.com + src="/images/howitworks_challenge.png" + loading="lazy"/>
El software de agente completa uno de los conjuntos de retos proveidos. Digamos que es capaz de realizar la segunda tarea anterior: crea un archivo en un *path* especifico en el site `http://example.com`. El agente también firma el `nonce` proveido con su llave privada. Una vez el agente ha completado estos pasos, notifica la AC que está listo para completar la validación. @@ -36,7 +37,8 @@ Luego, es el trabajo de la AC verificar los que retos han sido satisfechos. La A
Solicitando autorización para actuar por example.com + src="/images/howitworks_authorization.png" + loading="lazy"/>
Si la firma sobre el `nonce` es válida, y los retos son válidos, entonces el agente identificado por su llave pública está autorizado a realizar la gestión de certificados para `example.com`. Llamamos el par de llaves que el agente usó un "par de llaves autorizado" para `example.com`. @@ -52,13 +54,15 @@ Cuando el Let's Encrypt CA recibe una solicitud, verifica ambas firmas. Si todo
Solicitando un certificado para example.com + src="/images/howitworks_certificate.png" + loading="lazy"/>
Revocación funciona de una manera similar. El agent firma una solicitud de revocación con el par de llaves autorizado para `example.com`, y el Let's Encrypt CA verifica que la solicitud es autorizada. Si lo es, publica información de revocación a los canales normales de revocación (i.e. OCSP), para que los confiados tales como navegadores pueden saber que no deben aceptar el certificado recovado.
Solicitando revocación del certifiado para example.com + src="/images/howitworks_revocation.png" + loading="lazy"/>
diff --git a/content/es/trademarks.md b/content/es/trademarks.md index 98e8381ee0..86665ee2c7 100644 --- a/content/es/trademarks.md +++ b/content/es/trademarks.md @@ -102,19 +102,19 @@ Si desea utilizar las Marcas ISRG de una manera que no está cubierta por esta p Nuestro logotipo y texto estándar. Fuera de algunas excepciones, esta es la versión predeterminada. -

standard logo

+

standard logo

EPS SVG PNG

### Let's Encrypt Ancho La versión amplia de nuestro logo y texto. Use esto en contextos donde el espacio vertical es limitado. -

wide logo

+

wide logo

EPS SVG PNG

### Let's Encrypt Logo Nuestro logo solo. Use esto solo cuando la marca de la palabra "Let's Encrypt" sea claramente visible o esté bien establecida en otra parte de la página o en el diseño. (En caso de duda, use un formato diferente). -

lock only logo

+

lock only logo

EPS SVG PNG

diff --git a/content/fr/certificates.md b/content/fr/certificates.md index 02feb30bcb..f952160e6f 100644 --- a/content/fr/certificates.md +++ b/content/fr/certificates.md @@ -56,7 +56,7 @@ le certificat intermédiaire avec le sujet «Let’s Encrypt Authority X3» et Le schéma ci-dessous décrit les relations entre nos certificats : -Schéma des relations clés de l'ISRG +Schéma des relations clés de l'ISRG # Certificat de signature de l'OCSP diff --git a/content/fr/how-it-works.md b/content/fr/how-it-works.md index 9773443149..d7dffea3f5 100644 --- a/content/fr/how-it-works.md +++ b/content/fr/how-it-works.md @@ -27,7 +27,8 @@ En plus des défis, l'AC Let's Encrypt fournit également un nonce ("Number used
Demander des défis pour valider example.com + src="/images/howitworks_challenge.png" + loading="lazy"/>
L'agent logiciel réussi l'un des défis fournis. Disons qu'il est capable d'accomplir la seconde tâche ci-dessus: Il crée un fichier à un emplacemet spécifié du site `http://example.com`. L'agent signe également le nonce fourni avec sa clef privée. Une fois que l'agent à terminé ces étapes, il informe l'autorité de certification (AC) qu'il est prêt à poursuivre la validation. @@ -36,7 +37,8 @@ Ensuite, le travail de l'AC consiste à vérifier que les défis ont été relev
Demander l'autorisation d'agir pour example.com + src="/images/howitworks_authorization.png" + loading="lazy"/>
Si la signature sur le nonce est valide et que les défis sont validés, l'agent identifié par la clé publique est autorisé à effectuer la gestion des certificats pour `example.com`. Nous appelons la paire de clefs que l'agent a utilisé une "paire de clés autorisée" pour `example.com`. @@ -51,12 +53,14 @@ Lorsque l'AC Let's Encrypt reçoit la demande, elle vérifie les deux signa
Demander un certificat pour example.com + src="/images/howitworks_certificate.png" + loading="lazy"/>
La révocation fonctionne de la même manière. L'agent signe une demande de révocation avec la paire de clefs autorisée pour `example.com`, et l'AC Let's Encrypt vérifie que la demande est autorisée. Si c'est le cas, elle publie les informations de révocation dans les canaux de révocation normaux (c'est-à-dire l'OCSP), de sorte que les parties dépendantes, telles que les navigateurs, puissent savoir qu'ils ne doivent pas accepter le certificat révoqué.
Demander la révocation d'un certificat de example.com + src="/images/howitworks_revocation.png" + loading="lazy"/>
diff --git a/content/he/certificates.md b/content/he/certificates.md index ca7b945c40..f15eefd9f5 100644 --- a/content/he/certificates.md +++ b/content/he/certificates.md @@ -54,7 +54,7 @@ IdenTrust חתמו באופן צולב את אישורי התווך שלנו ל התמונה הבאה מסבירה את הקשרים בין האישורים שלנו בצורה חזותית: -תרשים יחסים בין מפתחות ISRG +תרשים יחסים בין מפתחות ISRG # אישור חתימה OCSP diff --git a/content/he/how-it-works.md b/content/he/how-it-works.md index 9ff5974ee7..7fbb46061e 100644 --- a/content/he/how-it-works.md +++ b/content/he/how-it-works.md @@ -27,7 +27,8 @@ Let's Encrypt מזהה את מנהל השרת באמצעות מפתח צי
בקשת אתגרים לתיקוף example.com + src="/images/howitworks_challenge.png" + loading="lazy"/>
תכנית הסוכן משלימה את אחת מסדרות האתגרים שסופקו. נניח שהוא מצליח להשלים את המשימה השנייה שלעיל: הסוכן יוצר קובץ תחת נתיב מסוים באתר `http://example.com`. הסוכן גם חותם על האסימון המוצפן עם המפתח הפרטי שלו. לאחר שהסוכן השלים את הצעדים האלה, הוא מודיע לרשות האישורים שהוא מוכן להשלים את התיקוף. @@ -36,7 +37,8 @@ Let's Encrypt מזהה את מנהל השרת באמצעות מפתח צי
בקשת הרשאה כדי לפעול עבור example.com + src="/images/howitworks_authorization.png" + loading="lazy"/>
אם החתימה על האסימון המוצפן תקפה והאתגרים הושלמו אז הסוכן שמזוהה באמצעות המפתח הציבורי מורשה לנהל אישורים עבור `example.com`. אנו קוראים לצמד המפתחות בהם משתמש הסוכן „צמד מפתחות מורשה” עבור `example.com`. @@ -52,14 +54,16 @@ Let's Encrypt מזהה את מנהל השרת באמצעות מפתח צי
בקשת אישור עבור example.com + src="/images/howitworks_certificate.png" + loading="lazy"/>
השלילה עובדת באופן דומה. הסוכן חותם על בקשת שלילה עם צמד המפתחות שמורשים עבור `example.com`, ורשות האישורים Let's Encrypt מוודאה שהבקשה מורשית. אם תהליך זה צלח, פרטי השלילה מפורסמים לערוצי השלילה הרגילים (למשל: OCSP), כדי שהגופים הנסמכים כגון דפדפנים יוכלו לדעת שאין עליהם לסמוך על אישורים שנשללו.
בקשת שלילת אישור עבור example.com + src="/images/howitworks_revocation.png" + loading="lazy"/>
diff --git a/content/he/trademarks.md b/content/he/trademarks.md index 597f06bb1a..a17926e17b 100644 --- a/content/he/trademarks.md +++ b/content/he/trademarks.md @@ -102,19 +102,19 @@ _הוספת קרדיט לסימן_. טקסט ההכרזה הבא אמור להו הלוגו והטקסט שמתלווה אליו באופן רגיל. למעט מספר חריגות, זאת גרסת בררת המחדל רצוי לעבוד אתה. -

לוגו רגיל

+

לוגו רגיל

EPS SVG PNG

### Let's Encrypt רחב הגרסה הרחבה של הלוגו והטקסט שמתלווה אליו. ניתן להשתמש בזה כשהמקום האנכי מוגבל. -

לוגו רחב

+

לוגו רחב

EPS SVG PNG

### המנעול של Let's Encrypt לבד הלוגו שלנו לבד. ניתן להשתמש בו רק כאשר המילה „Let's Encrypt” מופיעה עם סגנון מתאים באופן מוחצן או שהוא מופיע במקום אחר בעמוד או בעיצוב. (במקרה של ספק, יש להשתמש בתצורה אחרת.) -

לוגו מנעול בלבד

-

EPS SVG PNG

\ No newline at end of file +

לוגו מנעול בלבד

+

EPS SVG PNG

diff --git a/content/ja/certificates.md b/content/ja/certificates.md index cde47a9458..a551976342 100644 --- a/content/ja/certificates.md +++ b/content/ja/certificates.md @@ -54,7 +54,7 @@ Let's Encrypt の中間証明書は、ISRG Root X1 で署名されています 次の図は、Let's Encrypt の証明書の関係を視覚的に説明したものです。 -ISRG のキーの関係図 +ISRG のキーの関係図 # OCSP で署名された証明書 diff --git a/content/ja/how-it-works.md b/content/ja/how-it-works.md index c4440de2e1..8dea96c5e4 100644 --- a/content/ja/how-it-works.md +++ b/content/ja/how-it-works.md @@ -25,7 +25,8 @@ Let's Encrypt はサーバーの管理者を公開鍵で特定します。
example.com を検証するためのチャレンジのリクエスト + src="/images/howitworks_challenge.png" + loading="lazy"/>
エージェント・ソフトウェアは、提示されたチャレンジのうちの1つをクリアします。今、上の例で提示された2つ目のチャレンジをエージェントがクリアできるとしましょう。このとき、エージェントは `http://example.com` のサイト上の特定のパスにファイルを1つ生成します。また、エージェントは提示されたノンスに秘密鍵を使って署名します。エージェントがこれらのステップをクリアしたら、CA に検証の準備ができたことを伝えます。 @@ -34,7 +35,8 @@ Let's Encrypt はサーバーの管理者を公開鍵で特定します。
example.com の代表として振る舞うための認証リクエスト + src="/images/howitworks_authorization.png" + loading="lazy"/>
もし、ノンスに書かれた署名が有効であり、チャレンジがクリアされたならば、公開鍵を持つエージェントは `example.com` に対する証明書の管理を行うことを認証されたことになります。私たちは、このエージェントが使用するキーペアのことを、`example.com` に対して「認証されたキーペア」と呼びます。 @@ -49,12 +51,14 @@ Let's Encrypt CA がこのリクエストを受け取ると、両方の署
example.com に対する証明書のリクエスト + src="/images/howitworks_certificate.png" + loading="lazy"/>
無効化の作業も同じ方法で行われます。エージェントは無効化リクエストを作り、`example.com` に対して認証されたキーペアで署名をして送ります。Let's Encrypt CA はリクエストが認証されているかどうかを検証します。もし認証されていれば、証明書の無効化の情報を一般の無効化チャンネル (たとえば、OCSP) に公開します。その結果、このチャンネルを使用しているブラウザなどは、無効化された証明書を受け入れてはいけないことを知ることができます。
example.com に対する証明書の無効化リクエスト + src="/images/howitworks_revocation.png" + loading="lazy"/>
diff --git a/content/ko/certificates.md b/content/ko/certificates.md index 78739f85fc..a104017cc0 100644 --- a/content/ko/certificates.md +++ b/content/ko/certificates.md @@ -54,7 +54,7 @@ IdenTrust는 중간 인증서에 교차 서명했습니다. 이렇게 하면 저 다음 그림은 인증서 간의 관계를 시각적으로 설명합니다. -ISRG Key relationship diagram +ISRG Key relationship diagram # OCSP 서명 인증서 diff --git a/content/ko/how-it-works.md b/content/ko/how-it-works.md index 3d98bd7b5a..bcf3409b12 100644 --- a/content/ko/how-it-works.md +++ b/content/ko/how-it-works.md @@ -27,7 +27,8 @@ Let’s Encrypt는 공개키로 서버 관리자를 확인합니다. 에이전
example.com을 검증하기 위해 과제를 요구한다 + src="/images/howitworks_challenge.png" + loading="lazy"/>
해당 에이전트 소프트웨어는 제공된 도전 중 하나를 완료합니다. 두 번째 작업을 수행할 수 있다고 가정해 보십시오: `http://example.com` 웹 사이트의 특정한 경로에 파일을 생성합니다. 에이전트는 개인 키로 제공된 임시 값에 서명합니다. 에이전트가 이 단계들을 완료하면, 에이전트는 타당성 검증을 완료할 준비가 되었음을 CA에게 통지합니다. @@ -36,7 +37,8 @@ Let’s Encrypt는 공개키로 서버 관리자를 확인합니다. 에이전
example.com을 활동 허가를 요청하기 + src="/images/howitworks_authorization.png" + loading="lazy"/>
임시 값에 대한 서명이 타당하고, 과제는 사실로 확인되면, 공개 키에 의해 확인된 에이전트는 `example.com` 인증서 관리를 하기 위해 권한이 부여됩니다. 에이전트가 `example.com`을 위해 사용했던 키의 쌍을 “권한을 부여 받은 키의 쌍”이라고 부릅니다. @@ -51,12 +53,14 @@ Let’s Encrypt CA가 요청을 받을 때, 두 서명을 모두 검증합니다
example.com 자격증 요청 + src="/images/howitworks_certificate.png" + loading="lazy"/>
해지는 비슷한 방식으로 작동합니다. 에이전트가 `example.com`의 인증된 한 쌍의 키로 해지 요청에 서명하고, Let’s Encrypt CA가 그 요청이 권한이 있는지 검증합니다. 권한이 있다면, 브라우저와 같은 의존적인 당사자가 해지된 인증서를 받아들이면 안 된다는 것을 알 수 있도록 일반적인 해지 채널(예: OCSP)에 해지 정보를 게시합니다.
example.com에 대한 인증서 해지 요청 + src="/images/howitworks_revocation.png" + loading="lazy"/>
diff --git a/content/ko/trademarks.md b/content/ko/trademarks.md index 5426e83ef9..de6ee0bac9 100644 --- a/content/ko/trademarks.md +++ b/content/ko/trademarks.md @@ -102,19 +102,19 @@ ISRG 마크의 오용 여부를 [press@letsencrypt.org](mailto:press@letsencrypt 표준 로고 및 텍스트. 몇 가지 예외를 제외하고는 기본 버전입니다. -

standard logo

+

standard logo

EPS SVG PNG

### Let's Encrypt 넓은 버전 우리의 로고와 텍스트의 넓은 버전. 수직 공간이 제한된 상황에서 이것을 사용하십시오. -

wide logo

+

wide logo

EPS SVG PNG

### Let's Encrypt 잠금만 로고만. "Let's Encrypt" 단어 표시가 명확하게 표시되거나 페이지 또는 디자인의 다른 곳에 잘 설정된 경우에만 이 옵션을 사용하십시오. (확실하지 않으면 다른 형식을 사용하십시오.) -

lock only logo

+

lock only logo

EPS SVG PNG

diff --git a/content/pt-br/how-it-works.md b/content/pt-br/how-it-works.md index bf5f64c7ef..61dc4a133f 100644 --- a/content/pt-br/how-it-works.md +++ b/content/pt-br/how-it-works.md @@ -27,7 +27,8 @@ Juntamente com os desafios, a AC Let's Encrypt também provê um pacote de
Requesting challenges to validate example.com + src="/images/howitworks_challenge.png" + loading="lazy"/>
Vamos assumir que o agente é capaz de completar a segunda tarefa: ele cria um arquivo em um caminho especificado em `http://example.com`. O agente também assina o pacote de dados providos com sua chave privada. Uma vez que ele termina estes passos, ele notifica a AC que está pronto para concluir a validação. @@ -36,7 +37,8 @@ Agora é responsabilidade da AC verificar que os desafios foram completados. A A
Requesting authorization to act for example.com + src="/images/howitworks_authorization.png" + loading="lazy"/>
Se a assinatura no pacote de dados é válida e os desafios foram corretamente completados, o agente identificado pela chave pública é autorizado a cuidar do gerenciamento de certificados de `example.com`. Nós chamamos o par de chaves usado pelo agente de "par de chavez autorizado" para `example.com. @@ -51,13 +53,15 @@ Quando a Let's Encrypt recebe a solicitação ambas as assinaturas são val
Requesting a certificate for example.com + src="/images/howitworks_certificate.png" + loading="lazy"/>
A revogação funciona de maneira similar. O agente assina a solicitação de revogação com o par de chaves autorizado para `example.com` e a Let's Encrypt verifica se a solicitação é autorizada. Se for autorizada, a Let's Encrypt publica a informação de revogação em canais normais de revogação (como por exemplo OCSP), de maneira que terceiros que dependem de certificados (como navegadores) saibam que não devem confiar no certificado revogado.
Requesting revocation of a certificate for example.com + src="/images/howitworks_revocation.png" + loading="lazy"/>
diff --git a/content/ru/certificates.md b/content/ru/certificates.md index fe36c7112c..ba9be3565f 100644 --- a/content/ru/certificates.md +++ b/content/ru/certificates.md @@ -55,7 +55,7 @@ Root X1. Чтобы определить, какой из двух сертиф Картинка ниже иллюстрируеи взаимосвязи между перечисленными сертификатами: -ISRG Key relationship diagram +ISRG Key relationship diagram # Сертификат подписания ответов OCSP diff --git a/content/ru/how-it-works.md b/content/ru/how-it-works.md index cded95321b..3a694678d8 100644 --- a/content/ru/how-it-works.md +++ b/content/ru/how-it-works.md @@ -27,7 +27,8 @@ Let's Encrypt идентифицирует web-сервер с запуще
Requesting challenges to validate example.com + src="/images/howitworks_challenge.png" + loading="lazy"/>
Агент пытается выполнить серию тестов для проверки прав на домен. Допустим, успешно выполнено задание по созданию HTTP-ресурса - создан файл по определённому пути внутри `http://example.com`. Кроме того, агентом получен одноразовый пароль, который был подписан закрытым ключом и отправлен обратно в Let's Encrypt. Как только эти пункты выполнены - агент уведомляет Центр Сертификации о завершении проверки. @@ -36,7 +37,8 @@ Let's Encrypt идентифицирует web-сервер с запуще
Requesting authorization to act for example.com + src="/images/howitworks_authorization.png" + loading="lazy"/>
Если цифровая подпись верна, и все тесты пройдены - агенту выдаются права на управление сертификатами для домена `example.com`. Ключевая пара (открытый и закрытый ключи), используемая при проверке прав на домен, называется "авторизованной ключевой парой" для `example.com`. @@ -51,12 +53,14 @@ Let's Encrypt идентифицирует web-сервер с запуще
Requesting a certificate for example.com + src="/images/howitworks_certificate.png" + loading="lazy"/>
Отзыв сертификата происходит аналогично. Агент подписывает запрос об отзыве ключевой парой, авторизованной для `example.com`. Как только ЦС Let's Encrypt подтверждает цифровые подписи запроса, он публикует информацию об отзыве сертификата, используя [OSCP](https://en.wikipedia.org/wiki/Online_Certificate_Status_Protocol). Таким образом браузеры, полагаясь на данные из OSCP, не будут принимать отозванные сертификаты.
Requesting revocation of a certificate for example.com + src="/images/howitworks_revocation.png" + loading="lazy"/>
diff --git a/content/sr/certificates.md b/content/sr/certificates.md index 1872fb9be7..7cf1952137 100644 --- a/content/sr/certificates.md +++ b/content/sr/certificates.md @@ -70,7 +70,7 @@ Izdavač “DST Root CA X3.” Preporučeni Let's Encrypt softver, Sledeća slika objašnjava odnose između naših sertifikata vizuelno: -ISRG Key relationship diagram +ISRG Key relationship diagram # OCSP Signing Sertifikat @@ -95,4 +95,4 @@ dok ih izdajemo. Možete pregledati sve izdate sertifikate na sledećim linkovim Privatni ključevi za ISRG root CA i intermedijarni podaci Let’s Encrypt čuvaju se na hardverskim sigurnosnim modulima (HSM), koji pružaju visok stepen zaštite od krađe ključeva. -Svi ISRG ključevi trenutno su RSA ključevi. U budućnosti [planiramo generisati ECDSA ključeve](/upcoming-features). \ No newline at end of file +Svi ISRG ključevi trenutno su RSA ključevi. U budućnosti [planiramo generisati ECDSA ključeve](/upcoming-features). diff --git a/content/sr/how-it-works.md b/content/sr/how-it-works.md index 99e82a1a21..0675615a26 100644 --- a/content/sr/how-it-works.md +++ b/content/sr/how-it-works.md @@ -27,7 +27,8 @@ Uz dostupne načine verifikacije, Let's Encrypt sertifikaciono telo (CA) takođe
Requesting challenges to validate example.com + src="/images/howitworks_challenge.png" + loading="lazy"/>
Agentski softver završava verifikaciju jednim od ponuđenih načina. Recimo da je u stanju izvršiti verifikaciju koristeći drugi naveden način iznad: kreira datoteku na određenoj putanji na web serveru `http://example.com`. Agent takodje potpisuje svoj privatni ključ. Nakon što agent izvrši ove korake, obaveštava sertifikaciono telo (CA) da je spreman za potpunu proveru. @@ -36,7 +37,8 @@ Nakon toga, posao sertifikacionog tela (CA) jeste da proveri da li su uslovi i v
Requesting authorization to act for example.com + src="/images/howitworks_authorization.png" + loading="lazy"/>
Ako je potpis dobar, a verifikacija validna, tada je agent koji je identifikovan javnim ključem ovlašćen za upravljanje sertifikatom za domen `example.com`. @@ -52,12 +54,14 @@ Kada Let's Encrypt sertifikaciono telo (CA) primi zahtev, ono onda verifiku
Requesting a certificate for example.com + src="/images/howitworks_certificate.png" + loading="lazy"/>
Poništavanje sertifikata funkcioniše na sličan način. Agent potpisuje zahtev za poništavanje sertifikata svojim javnim ključem za domen `example.com`, gde nakon toga Let's Encrypt sertifikaciono telo (CA) verifikuje da je zahtev legitiman i odobren. Ukoliko da, onda objavljuje informaciju o poništavanju sertifikata putem standardnih kanala (primer. OCSP), tako da zavisni partneri budu obavešteni o tome kao što su web pretraživači u cilju kako bih znali da više ne prihvataju taj konkretan sertifikat kao validan.
Requesting revocation of a certificate for example.com + src="/images/howitworks_revocation.png" + loading="lazy"/>
diff --git a/content/sv/certificates.md b/content/sv/certificates.md index 5d6d8dcb93..c3e61abbee 100644 --- a/content/sv/certificates.md +++ b/content/sv/certificates.md @@ -85,7 +85,7 @@ sömlöst. Följande bild förklarar visuellt förhållandena mellan våra certifikat: -ISRG Key relationship diagram +ISRG Key relationship diagram # Certifikat för OCSP-signering diff --git a/content/sv/how-it-works.md b/content/sv/how-it-works.md index 44095dab90..9bcc55b356 100644 --- a/content/sv/how-it-works.md +++ b/content/sv/how-it-works.md @@ -45,7 +45,8 @@ kontrollerar nyckelparet.
Begäran om utmaningar för att validera example.com + src="/images/howitworks_challenge.png" + loading="lazy"/>
Agentmjukvaran utför en av de givna utmaningarna. Låt oss anta att den kan @@ -60,7 +61,8 @@ filen från webbservern och säkerställa att den har det förväntade innehåll
Begäran av behörighet att agera för example.com + src="/images/howitworks_authorization.png" + loading="lazy"/>
Om engångsvärdets signatur är korrekt och utmaningarna överensstämmer är @@ -89,7 +91,8 @@ nyckeln från CSR:en och skickar tillbaka det till agenten.
Begäran av certifikat för example.com + src="/images/howitworks_certificate.png" + loading="lazy"/>
Återkallande fungerar på ett liknande sätt. Agenten signerar en begäran om @@ -101,5 +104,6 @@ det återkallade certifikatet.
Begäran av återkallande av certifikat för example.com + src="/images/howitworks_revocation.png" + loading="lazy"/>
diff --git a/content/zh-cn/certificates.md b/content/zh-cn/certificates.md index 32a92efa5e..e95e4c12bb 100644 --- a/content/zh-cn/certificates.md +++ b/content/zh-cn/certificates.md @@ -55,7 +55,7 @@ IdenTrust已对我们的中间证书进行了交叉签名,以提高兼容性 下图用视觉方式诠释了证书之间的关系: -ISRG 证书关系图 +ISRG 证书关系图 # OCSP 签名证书 diff --git a/content/zh-cn/how-it-works.md b/content/zh-cn/how-it-works.md index 945d8f3d46..86b410d27f 100644 --- a/content/zh-cn/how-it-works.md +++ b/content/zh-cn/how-it-works.md @@ -26,7 +26,8 @@ Let's Encrypt 通过公钥识别服务器管理员。证书管理软件首次与
请求验证 example.com 的控制权 + src="/images/howitworks_challenge.png" + loading="lazy"/>
证书管理软件需要完其中一项提供的验证请求。假设它能够完成上面的第二个任务:它在 `https://example.com` 站点的指定路径上创建了一个文件。证书管理软件还使用其私钥对提供的 nonce(一次性数字)进行签名。完成这些步骤后,证书管理软件会通知 CA 它已准备好完成验证。 @@ -35,7 +36,8 @@ Let's Encrypt 通过公钥识别服务器管理员。证书管理软件首次与
请求代表 example.com 进行操作的授权 + src="/images/howitworks_authorization.png" + loading="lazy"/>
如果 nonce 上的签名有效,并且验证也成功完成,那么由公钥代表的证书管理软件将被授权对 `example.com` 进行证书管理。 我们将证书管理软件使用的密钥对称为 `example.com` 的“授权密钥对”。 @@ -51,12 +53,14 @@ Let's Encrypt 通过公钥识别服务器管理员。证书管理软件首次与
为 example.com 申请证书 + src="/images/howitworks_certificate.png" + loading="lazy"/>
申请吊销证书的流程类似。证书管理软件使用 `example.com` 的授权私钥签署一个吊销请求,Let's Encrypt CA 将验证该请求是否已被授权。如果已授权,则将吊销信息发布到正常的吊销通道(即 OCSP)中,以便浏览器等依赖方知道他们不应该接受这个已被吊销的证书。
申请吊销 example.com 的证书的流程 + src="/images/howitworks_revocation.png" + loading="lazy"/>
diff --git a/content/zh-cn/trademarks.md b/content/zh-cn/trademarks.md index e9af864159..36f702fae7 100644 --- a/content/zh-cn/trademarks.md +++ b/content/zh-cn/trademarks.md @@ -102,19 +102,19 @@ ISRG 的许多软件产品都是在开源的基础上提供的,这意味着您 我们的标准版 logo 和文字。除少数例外情况外,这是默认的、首选的版本。 -

标准版 logo

+

标准版 logo

EPS SVG PNG

### Let's Encrypt 加宽版 我们的 logo 和文字的加宽版本。在垂直空间有限的情况下可以使用这个版本。 -

加宽版 logo

+

加宽版 logo

EPS SVG PNG

### Let's Encrypt 无文字版本 只有我们的 logo 的无文字版本。仅当“Let's Encrypt”文字标志在页面或设计中的其他位置清晰可见或被公认时,才能使用此版本。(如有疑问,请使用其他版本。) -

无文字 logo

-

EPS SVG PNG

\ No newline at end of file +

无文字 logo

+

EPS SVG PNG

diff --git a/content/zh-tw/certificates.md b/content/zh-tw/certificates.md index 4aaef1eff2..151e040915 100644 --- a/content/zh-tw/certificates.md +++ b/content/zh-tw/certificates.md @@ -56,7 +56,7 @@ IdenTrust 和我們交互簽名 (Cross-Sign) 了中間憑證,這樣可以確 下圖表示憑證之間的關係: -ISRG 憑證關係圖 +ISRG 憑證關係圖 # OCSP 憑證 diff --git a/content/zh-tw/how-it-works.md b/content/zh-tw/how-it-works.md index cebd315355..a8444f00ac 100644 --- a/content/zh-tw/how-it-works.md +++ b/content/zh-tw/how-it-works.md @@ -26,7 +26,8 @@ Let's Encrypt 透過公鑰辨識伺服器。當憑證管理軟體首次向 Let's
Requesting challenges to validate example.com + src="/images/howitworks_challenge.png" + loading="lazy"/>
讓我們假設,憑證管理軟體想要完成上文所提到的第二個任務。憑證管理軟體會建立一個文件並放在 `http://example.com` 網站上指定的位置,並使用私鑰對隨機數進行簽名。動作完成後,它會告知 CA 它已經準備好以進行驗證了。 @@ -35,7 +36,8 @@ Let's Encrypt 透過公鑰辨識伺服器。當憑證管理軟體首次向 Let's
替 example.com 請求授權所需要的工作 + src="/images/howitworks_authorization.png" + loading="lazy"/>
如果對隨機數的簽名驗證通過,則這個考驗就算完成。這表示以公鑰作為識別的憑證管理軟體,有權管理 `example.com`。通常我們稱這個,由憑證管理軟體所使用,用來進行驗證的公私金鑰對為“授權金鑰對”。 @@ -51,12 +53,14 @@ Let's Encrypt 透過公鑰辨識伺服器。當憑證管理軟體首次向 Let's
替 example.com 申請憑證 + src="/images/howitworks_certificate.png" + loading="lazy"/>
註銷憑證的流程與申請流程類似。憑證管理軟體使用 `example.com` 的授權金鑰對替註銷請求簽名,接著 Let's Encrypt 會驗證該請求,如果請求通過驗證,它會將註銷訊息發佈到 OCSP (Online Certificate Status Protocol) 伺服器,以便讓瀏覽器等有關程式知道,他們不該信任已被註銷的憑證。
註銷 example.com 憑證的流程 + src="/images/howitworks_revocation.png" + loading="lazy"/>
diff --git a/layouts/index.html b/layouts/index.html index 4cb7a7f413..25e9b4f6c2 100644 --- a/layouts/index.html +++ b/layouts/index.html @@ -51,13 +51,13 @@

{{ i18n "home_major_sponsors" }}

{{ range $.Site.Data.sponsors.platinum }} - + {{ end }} {{ range $.Site.Data.sponsors.gold }} - + {{ end }} {{ range $.Site.Data.sponsors.silver }} - + {{ end }}
diff --git a/layouts/partials/footer.html b/layouts/partials/footer.html index 8289f325d2..53092d48a4 100644 --- a/layouts/partials/footer.html +++ b/layouts/partials/footer.html @@ -48,7 +48,7 @@

{{ i18n "footer_support_us" }}

- Linux Foundation Collaborative Projects + Linux Foundation Collaborative Projects
{{ i18n "linux_foundation_trademark" }} diff --git a/layouts/shortcodes/sponsors.html b/layouts/shortcodes/sponsors.html index 983b6c153b..322a23f4a0 100644 --- a/layouts/shortcodes/sponsors.html +++ b/layouts/shortcodes/sponsors.html @@ -4,7 +4,7 @@

{{ i18n "platinum" }}

{{ range $.Site.Data.sponsors.platinum }} - + {{ end }}
@@ -13,7 +13,7 @@

{{ i18n "platinum" }}

{{ i18n "gold" }}

{{ range $.Site.Data.sponsors.gold }} - + {{ end }}
@@ -22,7 +22,7 @@

{{ i18n "gold" }}

{{ i18n "silver" }}

{{ range $.Site.Data.sponsors.silver }} - + {{ end }}