ML
    • Recent
    • Categories
    • Tags
    • Popular
    • Users
    • Groups
    • Register
    • Login

    "Site not secure" | Self-signed Certificate?

    IT Discussion
    9
    25
    1.4k
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • Mr. JonesM
      Mr. Jones
      last edited by

      Can you prevent the formentioned error when visiting a domain server from a domain computer with a self-signed certificate? i.e. https://server:8080

      I've been doing a lot of reading on it and after failing repeately at the task, I read somewhere that no matter what you'll get that error unless the certificate is from a public Certificate Authority. But I read a lot of things on the internet that aren't quite right. My brain hurts, it's Friday, and I know this group would know the right answer.

      I'm wondering if I'm just doing things wrong, but before I dive into what I've tried, I wanted this question answered so I know if I need a different approach or not. Ultimately, I don't want to have to pay for an SSL, but I'll cross that road when I come to it.

      scottalanmillerS travisdh1T 1 3 Replies Last reply Reply Quote 0
      • scottalanmillerS
        scottalanmiller
        last edited by

        So the answer is... it depends. Do you control the computer in question? If so, you can normally add the certificate to it and it will trust it.

        But if you don't want to have to install the cert for every computer that will use it, then sadly only a CA signed cert (which are free, though) will work as you need to have the browser trust it and that is the only mechanism.

        Mr. JonesM 1 Reply Last reply Reply Quote 1
        • scottalanmillerS
          scottalanmiller @Mr. Jones
          last edited by

          @mr-jones said in "Site not secure" | Self-signed Certificate?:

          Ultimately, I don't want to have to pay for an SSL

          But they are free!

          1 Reply Last reply Reply Quote 0
          • scottalanmillerS
            scottalanmiller
            last edited by

            I think the easiest thing is to provide us with the entire scenario. What is the computer used for? Why the weird port? Why don't you have a cert?

            Weird port: 8080 is the generally accepted INSECURE secondary port. 8443 is the generally accepted SECURE secondary port. It's all random, but confusing to humans.

            1 Reply Last reply Reply Quote 1
            • travisdh1T
              travisdh1 @Mr. Jones
              last edited by

              @mr-jones said in "Site not secure" | Self-signed Certificate?:

              Can you prevent the formentioned error when visiting a domain server from a domain computer with a self-signed certificate? i.e. https://server:8080

              I've been doing a lot of reading on it and after failing repeately at the task, I read somewhere that no matter what you'll get that error unless the certificate is from a public Certificate Authority. But I read a lot of things on the internet that aren't quite right. My brain hurts, it's Friday, and I know this group would know the right answer.

              I'm wondering if I'm just doing things wrong, but before I dive into what I've tried, I wanted this question answered so I know if I need a different approach or not. Ultimately, I don't want to have to pay for an SSL, but I'll cross that road when I come to it.

              You can, but you have to add the SSL cert for https://server:8080 to every certificate store on each of the computers. Hopefully all your software uses the system certificate store, but you'll want to double check.

              1 Reply Last reply Reply Quote 0
              • 1
                1337 @Mr. Jones
                last edited by 1337

                @mr-jones said in "Site not secure" | Self-signed Certificate?:

                Can you prevent the formentioned error when visiting a domain server from a domain computer with a self-signed certificate? i.e. https://server:8080

                Yes, but it's a little difficult.

                1. Either you add the self-signed certificate for every server to all your computers. That's impractical though.

                2. Or you set up your own CA and add that to all your computers. Then you issue your own server certificates with your own CA and they will be trusted automatically.

                You can't get or buy publicly trusted SLL certificates for any server on your LAN, only for public FQDNs/IPs.

                Option 2 is what you are supposed to do. We've been planning to do it at work (linux infrastructure) but we haven't started on it yet.

                I'm not sure how you set up CA on Windows AD but I believe you can. Don't know if you can use that for non-Windows appliances.

                scottalanmillerS Mr. JonesM 2 Replies Last reply Reply Quote 1
                • DashrenderD
                  Dashrender
                  last edited by

                  Let's Encrypt supports free wildcard certs - so that could be an option for internal resources that use the FQDN but are only internal - updating the cert every 90 days or less is the bigger pain - though can be scripted.

                  1 Reply Last reply Reply Quote 0
                  • scottalanmillerS
                    scottalanmiller @1337
                    last edited by

                    @pete-s said in "Site not secure" | Self-signed Certificate?:

                    You can't get or buy publicly trusted SLL certificates for any server on your LAN, only for public FQDNs/IPs

                    We get them. It's just more effort.

                    1 1 Reply Last reply Reply Quote 1
                    • 1
                      1337 @scottalanmiller
                      last edited by

                      @scottalanmiller said in "Site not secure" | Self-signed Certificate?:

                      @pete-s said in "Site not secure" | Self-signed Certificate?:

                      You can't get or buy publicly trusted SLL certificates for any server on your LAN, only for public FQDNs/IPs

                      We get them. It's just more effort.

                      Please elaborate Scott!

                      JaredBuschJ 1 Reply Last reply Reply Quote 0
                      • JaredBuschJ
                        JaredBusch @1337
                        last edited by

                        @pete-s said in "Site not secure" | Self-signed Certificate?:

                        @scottalanmiller said in "Site not secure" | Self-signed Certificate?:

                        @pete-s said in "Site not secure" | Self-signed Certificate?:

                        You can't get or buy publicly trusted SLL certificates for any server on your LAN, only for public FQDNs/IPs

                        We get them. It's just more effort.

                        Please elaborate Scott!

                        Yes, please.

                        scottalanmillerS 1 Reply Last reply Reply Quote 0
                        • scottalanmillerS
                          scottalanmiller @JaredBusch
                          last edited by

                          @jaredbusch said in "Site not secure" | Self-signed Certificate?:

                          @pete-s said in "Site not secure" | Self-signed Certificate?:

                          @scottalanmiller said in "Site not secure" | Self-signed Certificate?:

                          @pete-s said in "Site not secure" | Self-signed Certificate?:

                          You can't get or buy publicly trusted SLL certificates for any server on your LAN, only for public FQDNs/IPs

                          We get them. It's just more effort.

                          Please elaborate Scott!

                          Yes, please.

                          Sure, you just have to do it via the DNS TXT process. The server has to be able to reach out, it can't be totally isolated from the Internet (unless you want to move the files around manually) but it verifies that you own the name without needed to provide a file. We do this for some clients all of the time. It's a pain and cannot be automated, so you need a human to get involved from time to time to make it work. But it works.

                          JaredBuschJ 1 Reply Last reply Reply Quote 1
                          • scottalanmillerS
                            scottalanmiller
                            last edited by

                            Here is a writeup that someone did..

                            https://gock.net/blog/2020/using-lets-encrypt-with-internal-web-server/

                            In this case they are using it for internal web servers. The reason that I normally use it is that I use LetsEncrypt for things that aren't web servers and so act the same as isolated LAN devices.

                            dbeatoD 1 Reply Last reply Reply Quote 1
                            • Mr. JonesM
                              Mr. Jones @scottalanmiller
                              last edited by

                              @scottalanmiller said in "Site not secure" | Self-signed Certificate?:

                              So the answer is... it depends. Do you control the computer in question? If so, you can normally add the certificate to it and it will trust it.

                              But if you don't want to have to install the cert for every computer that will use it, then sadly only a CA signed cert (which are free, though) will work as you need to have the browser trust it and that is the only mechanism.

                              Okay, so if what you are saying is true, then I'm doing it incorrectly.

                              I was using :8443 btw, I don't know why I used :8080 as an example.

                              What are the steps here?

                              Do I create a .p12, split out the private .key and store that on the server, then split out the public .pem and push that to all domain computers into the Trusted Root Certificates directory via Group Policy?

                              Or do you have to have a .crt in the mix and that's why this approach would be such a pita.

                              1 Reply Last reply Reply Quote 0
                              • dbeatoD
                                dbeato @scottalanmiller
                                last edited by

                                @scottalanmiller I am confused, if you certbot or any other Lets Encrypt client, it can use DNS verification automatically without needing any server enabled externally. That's what I have been doing with CloudFlare and their API, are you doing something different?
                                I even apply it to current web facing servers so I don't need to open port 80 as well.

                                scottalanmillerS D 3 Replies Last reply Reply Quote 3
                                • scottalanmillerS
                                  scottalanmiller @dbeato
                                  last edited by

                                  @dbeato said in "Site not secure" | Self-signed Certificate?:

                                  I am confused, if you certbot or any other Lets Encrypt client, it can use DNS verification automatically without needing any server enabled externally.

                                  No, not all of them. They have ones that require manual intervention. The ones that handle internal servers.

                                  1 Reply Last reply Reply Quote 0
                                  • scottalanmillerS
                                    scottalanmiller @dbeato
                                    last edited by

                                    @dbeato said in "Site not secure" | Self-signed Certificate?:

                                    That's what I have been doing with CloudFlare and their API, are you doing something different?
                                    I even apply it to current web facing servers so I don't need to open port 80 as well.

                                    We don't always have CloudFlare. If we control the server and not the DNS hosting, it can be complicated.

                                    dafyreD 1 Reply Last reply Reply Quote 0
                                    • dafyreD
                                      dafyre @scottalanmiller
                                      last edited by dafyre

                                      @scottalanmiller said in "Site not secure" | Self-signed Certificate?:

                                      @dbeato said in "Site not secure" | Self-signed Certificate?:

                                      That's what I have been doing with CloudFlare and their API, are you doing something different?
                                      I even apply it to current web facing servers so I don't need to open port 80 as well.

                                      We don't always have CloudFlare. If we control the server and not the DNS hosting, it can be complicated.

                                      True. But even Godaddy has APIs for this now, lol. If SlowDaddy can do it, I'd suspect that some of the others do as well.

                                      scottalanmillerS 1 Reply Last reply Reply Quote 0
                                      • scottalanmillerS
                                        scottalanmiller @dafyre
                                        last edited by

                                        @dafyre said in "Site not secure" | Self-signed Certificate?:

                                        @scottalanmiller said in "Site not secure" | Self-signed Certificate?:

                                        @dbeato said in "Site not secure" | Self-signed Certificate?:

                                        That's what I have been doing with CloudFlare and their API, are you doing something different?
                                        I even apply it to current web facing servers so I don't need to open port 80 as well.

                                        We don't always have CloudFlare. If we control the server and not the DNS hosting, it can be complicated.

                                        True. But even Godaddy has APIs for this now, lol. If SlowDaddy can do it, I'd suspect that some of the others do as well.

                                        That "someone" has API access doesn't matter if you don't have any access to the provider. Sometimes you only have the server.

                                        dbeatoD 1 Reply Last reply Reply Quote 0
                                        • dbeatoD
                                          dbeato @scottalanmiller
                                          last edited by

                                          @scottalanmiller Okay, but lets see can we request API access to any of them yes. But doing manual work its just not great. Are you saying that you control just a subset of servers and the rest is on their own and the customer cannot give you DNS access even as a request? or is it trying not to get involved with the other vendors or DNS hosting provider?

                                          scottalanmillerS 1 Reply Last reply Reply Quote 0
                                          • scottalanmillerS
                                            scottalanmiller @dbeato
                                            last edited by

                                            @dbeato said in "Site not secure" | Self-signed Certificate?:

                                            @scottalanmiller Okay, but lets see can we request API access to any of them yes. But doing manual work its just not great. Are you saying that you control just a subset of servers and the rest is on their own and the customer cannot give you DNS access even as a request? or is it trying not to get involved with the other vendors or DNS hosting provider?

                                            Right, we manage X and not Y and cannot get the API because we have to request through a human for a change. If the ONLY thing we can touch is the server, and the server cannot be exposed over port 80, we need to do it manually.

                                            1 Reply Last reply Reply Quote 0
                                            • 1
                                            • 2
                                            • 1 / 2
                                            • First post
                                              Last post