Últimas notícias

Fique informado

Should you use Let’s Encrypt for internal hostnames?

7 de janeiro de 2022

Spotlight

Doc9 lança Guia Prático de Prompts para ChatGPT no Jurídico: Como Maximizar a Eficiência com a Inteligência Artificial

Para obter os melhores resultados com o ChatGPT no contexto jurídico, siga as dicas importantes do Guia Prático de Prompts da doc9.

28 de maio de 2024

Governo Federal apoia Rio Grande do Sul na emissão 2ª via da Carteira de Identidade Nacional

O mutirão coordenado pelo Governo do RS começou nos abrigos de Porto Alegre. Expedição da segunda via será imediata

20 de maio de 2024

It means your employees aren’t constantly fighting browser warnings when trying to submit stuff internally, all your http traffic is encrypted

Julien Savoie has written a brilliant post explaining how you can enable https on your intranet.

This is useful for several reasons. It means your employees aren’t constantly fighting browser warnings when trying to submit stuff internally. All your http traffic is encrypted. You don’t need to install a self-generated root certificate on devices. Lovely!

But there’s a downside. Every TLS certificate created by Let’s Encrypt is recorded in a Certificate Transparency log. These CT logs are primarily to detect maliciously or mistakenly issued certificates. For example, you can look through them and see that someone unauthorised has created a cert for your domain – or its sub-domains.

But there is a downside. The CT logs are public and can be searched. Here’s all the certificates issued for Twitter’s sub-domains.

There are a few ways that this can be dangerous for use with internal services.

Firstly, it aides reconnaissance for attackers. Having a “map” of your internal infrastructure is useful. Especially if you have “obviously” named servers like exchange.example.com or customerdata.example.com. Also handy for social engineering – who else but someone internal would know that gandalf.example.com was a valid server?

Secondly, it might expose some vulnerabilities – depending on how you name things. Let’s hope you don’t have log4j.example.com!

Thirdly, there’s the potential for espionage. Do you want your competitors knowing that you’ve got olympics-campaign.staging.example.com?

I’m sure you can think of a few other ways this could be used for mischief and mayhem.

As I wrote a few years ago, “There’s no HTTPS for the Internet of Things”. Internal networks which only have IP addresses cannot use TLS certificates. OK, so you decide to have an internal DNS – now the whole world knows you have doorbell-model-xyz.myhome.example.com!

The only real answer to this is to use Wildcard Certificates. You can get a TLS certificate for *.internal.example.com

This requires setting up a DNS-01 Challenge – which can be more difficult to configure and has some non-obvious risks. And, sadly, Wildcard certificates come with their own difficulties.

Recap

I don’t think there’s a good solution to this.

Self-signed certificates require something to be installed on all clients. Not always possible with BYOD.
Named LE certificates expose details of your infrastructure which you may wish to keep private.
Wildcard certificates require a heightened level of co-ordination and management.
These problems have all been discussed before. But I can’t help but wishing that there was something obvious I’m missing.

How would you solve this knotty problem?

Performance and Innovation Are the Rewards of Digital Transformation

How does digital authentication work? And how can you implement it securely in your organisation?

How does Log4Shell works and what steps do you need to take?

Você quer acompanhar nosso conteúdo? Então siga nossa página no LinkedIn!