Follow Slashdot blog updates by subscribing to our blog RSS feed

 



Forgot your password?
typodupeerror
×
Encryption Security IT

SSL Certificates For Intranet Sites? 286

wiedzmin writes "Anybody who has worked around anything dubbed an 'appliance' in the past few years knows that they come with a management Web interface, which is usually 'secure.' However, no company in their right (accounting) mind will spend $400/year per appliance to buy Verisign SSL certificates to secure Web interfaces on networks that may not even be open to the public Internet. So network administrators, and sometimes end users, are stuck clicking away at an annoying 'Continue to this website (not recommended)' message every time they connect, setting an unhealthy precedent when it comes to the actual security of SSL and the much-hyped MITM attacks. So the question I have for the Slashdot crowd is: do you have valid SSL certificates on your intranet sites, and if so what do you use? Any cost-neutral, or at least cost-conscious solutions out there that don't involve manually distributing your certificates and CRL to every workstation in the company? Thanks."
This discussion has been archived. No new comments can be posted.

SSL Certificates For Intranet Sites?

Comments Filter:
  • by Anonymous Coward on Tuesday November 23, 2010 @11:32AM (#34317978)

    Because your question implies that the asker is actually competent at their job. Anyone with half a brain would have already come up with that solution a long time ago.

  • by jandrese ( 485 ) <kensama@vt.edu> on Tuesday November 23, 2010 @11:35AM (#34318020) Homepage Journal
    Every browser has a way to store the security exceptions so that you don't get that warning every time. Just set the box up on a private network the first time to avoid a MitM attack and store the cert. If you ever get another warning about an untrusted cert from the box, then you might have a MitM attack going on, but otherwise if the cert matches you're fine.

    You could also set up your own local root authority (most larger companies do this) and make your own certs.
  • by amorsen ( 7485 ) <benny+slashdot@amorsen.dk> on Tuesday November 23, 2010 @11:37AM (#34318052)

    The available certificate servers which are Free Software tend to be rather user-unfriendly. Maintaining certificate revocation lists and handling certificates for different purposes (mail, web, code, client authentication, vpn...) are needlessly time-consuming chores. Obviously any competent system administrator can script their way out of it, but in this case it is a rather large effort.

    I would be very happy to hear about an easier solution.

  • by pla ( 258480 ) on Tuesday November 23, 2010 @11:42AM (#34318102) Journal
    Because your question implies that the asker is actually competent at their job. Anyone with half a brain would have already come up with that solution a long time ago.

    FTFP: "Any cost-neutral, or at least cost-conscious solutions out there that don't involve manually distributing your certificates and CRL to every workstation in the company? Thanks."

    Before snarking on the FP author, perhaps you should actually read the FP's question?
  • by corbettw ( 214229 ) on Tuesday November 23, 2010 @11:52AM (#34318240) Journal

    Doesn't mean he's wrong. Seriously, this is SSL 101, and anyone tasked with setting up SSL-protected websites should've intuitively known the answer before the question was even asked.

  • by Yaa 101 ( 664725 ) on Tuesday November 23, 2010 @11:52AM (#34318256) Journal

    Sorry, but every certificate authority is manually distributed at some point, the verizon's of this planet included, they just have the convenience that browser manufacturers do that for them.

    The most automatic way to do what the main requester wants is to set up that certificate authority and roll out your browsers automatically after adding that certificate authority it's root to that browser.

    I do not know any other way to do this automatically.

  • by apparently ( 756613 ) on Tuesday November 23, 2010 @11:57AM (#34318338)

    FTFP: "Any cost-neutral, or at least cost-conscious solutions out there that don't involve manually distributing your certificates and CRL to every workstation in the company? Thanks." Before snarking on the FP author, perhaps you should actually read the FP's question?

    So a login script (or in a Microsoft environment, an AD group policy) that distributes the certificate automatically to each computer meets your definition of "manual distribution?"
    Really? That's what you're saying? "Automatic" and "manual" are synonyms in your universe? wow.

  • by Kupfernigk ( 1190345 ) on Tuesday November 23, 2010 @11:58AM (#34318354)
    I've seen similar comments get marked troll before. Yet for many websites, the direction of trust is from them to you. If you want to log in to my website, which provides information, I store no personal information other than a user name and password. I have to trust you before giving you the information you want.

    What we actually have here is a psychological issue - the cert vendors want you to believe that anyone who doesn't buy their certs is a potential criminal. The rule should simply be "no financial transactions or personal data on a site without an entrusted cert".

    Other than common sense, there is nothing to stop me posting my credit card details on Slashdot. If I log into a public forum using HTTPS, I still have no protection against my own stupidity if I do that. Now, without simply modding this troll, can anybody give a coherent explanation as to why browsers shouldn't assess self-signed certs according to their origin - within the intranet, valid server name - rather than treating selfcert.ru the same as selfcert.10.0.0.1?

  • by apparently ( 756613 ) on Tuesday November 23, 2010 @12:08PM (#34318512)

    A variant would work if all browser user were technical enough to download and install a browser, that is a central in house downloadable copy with that root installed in the browser.

    That only works if you're also fine with local users having the privileges to install software on their workstations. So you're only trading one security issue for another.

  • by Eunuchswear ( 210685 ) on Tuesday November 23, 2010 @12:40PM (#34319082) Journal

    This is done by having the server present a certificate, which the client can then verify was signed by one of many trusted authorities.

    The only thing the "trusted authorites" confirm is that the person who has the cert paid for it.

    Some trust.

    The whole SSL certificate crap is a scam. The only interesting thing to know would be "is this site using the same certificate as the last time I connected to it". And the shitty browsers don't tell you that.

    (The protocol should also have some reasonable way of doing rollover, like presenting a new certificate in the session "this is what we're going to be using starting...").

    That is why SSL authenticates the remote site. Encrypting the transport prevents eavesdropping, while authenticating the remote site prevents man-in-the-middle attacks. You need both to have any degree of security.

    But they don't authenticate the remote site. They just check that the remote site has a certificate signed by one of those super trustworthy people like Verisign or the government of China.

  • by rainer_d ( 115765 ) on Tuesday November 23, 2010 @12:42PM (#34319122) Homepage

    That's the "I'm feeling lucky" google-fed generation.
    If it's not on the first page in google results, go and ask in a forum.
    Though, that's actually old-school, sort-of - people tend to ask in their twitter feed nowadays...

  • by peacefinder ( 469349 ) <(moc.liamg) (ta) (ttiwed.nala)> on Tuesday November 23, 2010 @12:52PM (#34319356) Journal

    Congratulations on getting your story accepted to the front page!

    Dozens of man-hours will now be spent explaining basics of inhouse certificate authorities and self-signing, along with comments on your lack of basic research, intelligence, qualification for your position, and legitimate parentage.

  • by Anonymous Coward on Tuesday November 23, 2010 @01:05PM (#34319588)

    I learned a long time ago never to submit a question to Ask Slashdot because even if it is something obscure and arcane, people will gang up on me and call me stupid for not knowing it.

  • by rjstanford ( 69735 ) on Tuesday November 23, 2010 @02:36PM (#34320972) Homepage Journal

    And to those of you here who claim "half a brain": please remember that you yourselves may someday need to do something (legal, financial, educational, even technical) for which you are less than half competent. Yes, you have achieved a "win" in humilating a sincere poster, but it's the cheap victory enjoyed only by the pusillanimous.

    Here's the deal. Either this person is administering a smallish number of machines, in which case he/she can simply go 'round and install certificates on all of them, or they're administering an assload of them, in which case they do indeed deserve the scorn for not being willing to do a modicum of research and choose the standard approach.

    Your defense only works if they're in charge of too many machines to administer manually, but yet have no experience doing so - a situation which is highly unlikely. It might be a temporary situation due to turnover, but in that case they shouldn't be implementing a "convenience" feature like this one themselves.

  • by Anpheus ( 908711 ) on Tuesday November 23, 2010 @08:55PM (#34325862)

    Yes! I've discovered lately when evaluating Chrome for workstation use that Chrome now has a (ever-growing) list of group policies available. Grab the adm/admx [chromium.org] templates and MSI installer and check them out.

    Coincidentally, the latest Chromium/Chrome Canary/Chrome Dev builds also started ignoring IE's trusted zone lists and so windows integrated authentication (Kerberos Negotiate) stopped working. Boo. Supposedly there's a new policy that I can set to fix this. I reported the issue [google.com] but am waiting for clarification on whether this is intended behavior, a security issue, or what.

"Experience has proved that some people indeed know everything." -- Russell Baker

Working...