ML
    • Recent
    • Categories
    • Tags
    • Popular
    • Users
    • Groups
    • Register
    • Login

    "Site not secure" | Self-signed Certificate?

    IT Discussion
    9
    25
    1.4k
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • scottalanmillerS
      scottalanmiller
      last edited by

      So the answer is... it depends. Do you control the computer in question? If so, you can normally add the certificate to it and it will trust it.

      But if you don't want to have to install the cert for every computer that will use it, then sadly only a CA signed cert (which are free, though) will work as you need to have the browser trust it and that is the only mechanism.

      Mr. JonesM 1 Reply Last reply Reply Quote 1
      • scottalanmillerS
        scottalanmiller @Mr. Jones
        last edited by

        @mr-jones said in "Site not secure" | Self-signed Certificate?:

        Ultimately, I don't want to have to pay for an SSL

        But they are free!

        1 Reply Last reply Reply Quote 0
        • scottalanmillerS
          scottalanmiller
          last edited by

          I think the easiest thing is to provide us with the entire scenario. What is the computer used for? Why the weird port? Why don't you have a cert?

          Weird port: 8080 is the generally accepted INSECURE secondary port. 8443 is the generally accepted SECURE secondary port. It's all random, but confusing to humans.

          1 Reply Last reply Reply Quote 1
          • travisdh1T
            travisdh1 @Mr. Jones
            last edited by

            @mr-jones said in "Site not secure" | Self-signed Certificate?:

            Can you prevent the formentioned error when visiting a domain server from a domain computer with a self-signed certificate? i.e. https://server:8080

            I've been doing a lot of reading on it and after failing repeately at the task, I read somewhere that no matter what you'll get that error unless the certificate is from a public Certificate Authority. But I read a lot of things on the internet that aren't quite right. My brain hurts, it's Friday, and I know this group would know the right answer.

            I'm wondering if I'm just doing things wrong, but before I dive into what I've tried, I wanted this question answered so I know if I need a different approach or not. Ultimately, I don't want to have to pay for an SSL, but I'll cross that road when I come to it.

            You can, but you have to add the SSL cert for https://server:8080 to every certificate store on each of the computers. Hopefully all your software uses the system certificate store, but you'll want to double check.

            1 Reply Last reply Reply Quote 0
            • 1
              1337 @Mr. Jones
              last edited by 1337

              @mr-jones said in "Site not secure" | Self-signed Certificate?:

              Can you prevent the formentioned error when visiting a domain server from a domain computer with a self-signed certificate? i.e. https://server:8080

              Yes, but it's a little difficult.

              1. Either you add the self-signed certificate for every server to all your computers. That's impractical though.

              2. Or you set up your own CA and add that to all your computers. Then you issue your own server certificates with your own CA and they will be trusted automatically.

              You can't get or buy publicly trusted SLL certificates for any server on your LAN, only for public FQDNs/IPs.

              Option 2 is what you are supposed to do. We've been planning to do it at work (linux infrastructure) but we haven't started on it yet.

              I'm not sure how you set up CA on Windows AD but I believe you can. Don't know if you can use that for non-Windows appliances.

              scottalanmillerS Mr. JonesM 2 Replies Last reply Reply Quote 1
              • DashrenderD
                Dashrender
                last edited by

                Let's Encrypt supports free wildcard certs - so that could be an option for internal resources that use the FQDN but are only internal - updating the cert every 90 days or less is the bigger pain - though can be scripted.

                1 Reply Last reply Reply Quote 0
                • scottalanmillerS
                  scottalanmiller @1337
                  last edited by

                  @pete-s said in "Site not secure" | Self-signed Certificate?:

                  You can't get or buy publicly trusted SLL certificates for any server on your LAN, only for public FQDNs/IPs

                  We get them. It's just more effort.

                  1 1 Reply Last reply Reply Quote 1
                  • 1
                    1337 @scottalanmiller
                    last edited by

                    @scottalanmiller said in "Site not secure" | Self-signed Certificate?:

                    @pete-s said in "Site not secure" | Self-signed Certificate?:

                    You can't get or buy publicly trusted SLL certificates for any server on your LAN, only for public FQDNs/IPs

                    We get them. It's just more effort.

                    Please elaborate Scott!

                    JaredBuschJ 1 Reply Last reply Reply Quote 0
                    • JaredBuschJ
                      JaredBusch @1337
                      last edited by

                      @pete-s said in "Site not secure" | Self-signed Certificate?:

                      @scottalanmiller said in "Site not secure" | Self-signed Certificate?:

                      @pete-s said in "Site not secure" | Self-signed Certificate?:

                      You can't get or buy publicly trusted SLL certificates for any server on your LAN, only for public FQDNs/IPs

                      We get them. It's just more effort.

                      Please elaborate Scott!

                      Yes, please.

                      scottalanmillerS 1 Reply Last reply Reply Quote 0
                      • scottalanmillerS
                        scottalanmiller @JaredBusch
                        last edited by

                        @jaredbusch said in "Site not secure" | Self-signed Certificate?:

                        @pete-s said in "Site not secure" | Self-signed Certificate?:

                        @scottalanmiller said in "Site not secure" | Self-signed Certificate?:

                        @pete-s said in "Site not secure" | Self-signed Certificate?:

                        You can't get or buy publicly trusted SLL certificates for any server on your LAN, only for public FQDNs/IPs

                        We get them. It's just more effort.

                        Please elaborate Scott!

                        Yes, please.

                        Sure, you just have to do it via the DNS TXT process. The server has to be able to reach out, it can't be totally isolated from the Internet (unless you want to move the files around manually) but it verifies that you own the name without needed to provide a file. We do this for some clients all of the time. It's a pain and cannot be automated, so you need a human to get involved from time to time to make it work. But it works.

                        JaredBuschJ 1 Reply Last reply Reply Quote 1
                        • scottalanmillerS
                          scottalanmiller
                          last edited by

                          Here is a writeup that someone did..

                          https://gock.net/blog/2020/using-lets-encrypt-with-internal-web-server/

                          In this case they are using it for internal web servers. The reason that I normally use it is that I use LetsEncrypt for things that aren't web servers and so act the same as isolated LAN devices.

                          dbeatoD 1 Reply Last reply Reply Quote 1
                          • Mr. JonesM
                            Mr. Jones @scottalanmiller
                            last edited by

                            @scottalanmiller said in "Site not secure" | Self-signed Certificate?:

                            So the answer is... it depends. Do you control the computer in question? If so, you can normally add the certificate to it and it will trust it.

                            But if you don't want to have to install the cert for every computer that will use it, then sadly only a CA signed cert (which are free, though) will work as you need to have the browser trust it and that is the only mechanism.

                            Okay, so if what you are saying is true, then I'm doing it incorrectly.

                            I was using :8443 btw, I don't know why I used :8080 as an example.

                            What are the steps here?

                            Do I create a .p12, split out the private .key and store that on the server, then split out the public .pem and push that to all domain computers into the Trusted Root Certificates directory via Group Policy?

                            Or do you have to have a .crt in the mix and that's why this approach would be such a pita.

                            1 Reply Last reply Reply Quote 0
                            • dbeatoD
                              dbeato @scottalanmiller
                              last edited by

                              @scottalanmiller I am confused, if you certbot or any other Lets Encrypt client, it can use DNS verification automatically without needing any server enabled externally. That's what I have been doing with CloudFlare and their API, are you doing something different?
                              I even apply it to current web facing servers so I don't need to open port 80 as well.

                              scottalanmillerS D 3 Replies Last reply Reply Quote 3
                              • scottalanmillerS
                                scottalanmiller @dbeato
                                last edited by

                                @dbeato said in "Site not secure" | Self-signed Certificate?:

                                I am confused, if you certbot or any other Lets Encrypt client, it can use DNS verification automatically without needing any server enabled externally.

                                No, not all of them. They have ones that require manual intervention. The ones that handle internal servers.

                                1 Reply Last reply Reply Quote 0
                                • scottalanmillerS
                                  scottalanmiller @dbeato
                                  last edited by

                                  @dbeato said in "Site not secure" | Self-signed Certificate?:

                                  That's what I have been doing with CloudFlare and their API, are you doing something different?
                                  I even apply it to current web facing servers so I don't need to open port 80 as well.

                                  We don't always have CloudFlare. If we control the server and not the DNS hosting, it can be complicated.

                                  dafyreD 1 Reply Last reply Reply Quote 0
                                  • dafyreD
                                    dafyre @scottalanmiller
                                    last edited by dafyre

                                    @scottalanmiller said in "Site not secure" | Self-signed Certificate?:

                                    @dbeato said in "Site not secure" | Self-signed Certificate?:

                                    That's what I have been doing with CloudFlare and their API, are you doing something different?
                                    I even apply it to current web facing servers so I don't need to open port 80 as well.

                                    We don't always have CloudFlare. If we control the server and not the DNS hosting, it can be complicated.

                                    True. But even Godaddy has APIs for this now, lol. If SlowDaddy can do it, I'd suspect that some of the others do as well.

                                    scottalanmillerS 1 Reply Last reply Reply Quote 0
                                    • scottalanmillerS
                                      scottalanmiller @dafyre
                                      last edited by

                                      @dafyre said in "Site not secure" | Self-signed Certificate?:

                                      @scottalanmiller said in "Site not secure" | Self-signed Certificate?:

                                      @dbeato said in "Site not secure" | Self-signed Certificate?:

                                      That's what I have been doing with CloudFlare and their API, are you doing something different?
                                      I even apply it to current web facing servers so I don't need to open port 80 as well.

                                      We don't always have CloudFlare. If we control the server and not the DNS hosting, it can be complicated.

                                      True. But even Godaddy has APIs for this now, lol. If SlowDaddy can do it, I'd suspect that some of the others do as well.

                                      That "someone" has API access doesn't matter if you don't have any access to the provider. Sometimes you only have the server.

                                      dbeatoD 1 Reply Last reply Reply Quote 0
                                      • dbeatoD
                                        dbeato @scottalanmiller
                                        last edited by

                                        @scottalanmiller Okay, but lets see can we request API access to any of them yes. But doing manual work its just not great. Are you saying that you control just a subset of servers and the rest is on their own and the customer cannot give you DNS access even as a request? or is it trying not to get involved with the other vendors or DNS hosting provider?

                                        scottalanmillerS 1 Reply Last reply Reply Quote 0
                                        • scottalanmillerS
                                          scottalanmiller @dbeato
                                          last edited by

                                          @dbeato said in "Site not secure" | Self-signed Certificate?:

                                          @scottalanmiller Okay, but lets see can we request API access to any of them yes. But doing manual work its just not great. Are you saying that you control just a subset of servers and the rest is on their own and the customer cannot give you DNS access even as a request? or is it trying not to get involved with the other vendors or DNS hosting provider?

                                          Right, we manage X and not Y and cannot get the API because we have to request through a human for a change. If the ONLY thing we can touch is the server, and the server cannot be exposed over port 80, we need to do it manually.

                                          1 Reply Last reply Reply Quote 0
                                          • JaredBuschJ
                                            JaredBusch @scottalanmiller
                                            last edited by

                                            @scottalanmiller said in "Site not secure" | Self-signed Certificate?:

                                            @jaredbusch said in "Site not secure" | Self-signed Certificate?:

                                            @pete-s said in "Site not secure" | Self-signed Certificate?:

                                            @scottalanmiller said in "Site not secure" | Self-signed Certificate?:

                                            @pete-s said in "Site not secure" | Self-signed Certificate?:

                                            You can't get or buy publicly trusted SLL certificates for any server on your LAN, only for public FQDNs/IPs

                                            We get them. It's just more effort.

                                            Please elaborate Scott!

                                            Yes, please.

                                            Sure, you just have to do it via the DNS TXT process. The server has to be able to reach out, it can't be totally isolated from the Internet (unless you want to move the files around manually) but it verifies that you own the name without needed to provide a file. We do this for some clients all of the time. It's a pain and cannot be automated, so you need a human to get involved from time to time to make it work. But it works.

                                            That is more than getting a cert for everything on your LAN. That is also giving everything your on LAN a valid FQDN, and thus also valid internal DNS records, or NAT reflection etc, for said traffic.

                                            scottalanmillerS 1 Reply Last reply Reply Quote 1
                                            • 1
                                            • 2
                                            • 1 / 2
                                            • First post
                                              Last post