Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

Using a public CA is far better for security than a custom private one. It's a pain having to install the certificate on every client, server, piece of software, etc. and in my experience this inevitably leads to people disabling certificate checking as part of troubleshooting and this being left on. Also, sometimes people need to access documents and emails from home computers and the company may use some devices on which it isn't possible to install the CA


So exposing your internal infrastructure to the whole world and risking a 3rd party (CA) turning the keys (literally) to your kingdom to someone else is better than someone making a mistake that’s very easy to discover and correct?

> Also, sometimes people need to access documents and emails from home computers and the company may use some devices on which it isn't possible to install the CA

That’s a plus as far most security professionals are concerned


> So exposing your internal infrastructure to the whole world and risking a 3rd party (CA) turning the keys (literally) to your kingdom to someone else is better than someone making a mistake that’s very easy to discover and correct?

That's not how certificates work. The CA doesn't have your private key. They could theoretically sign a fake certificate with your hostname but that risk is still present if you use a private CA and is mitigated by certificate transparency


Yes, should’ve been more clear on that they sign a cert without your knowledge and hand to to someone performing mitm. How is that risk present when you roll your own PKI and validate against your private CA (or intermediate) only?

Regarding CT I’m not aware of any clients other than browsers actually enforcing that.


Typically an internal CA adds to the certificate trust store rather than replacing it.


Yes you are correct here (although I’ve seen both methods). At least 3rd party won’t easily know which hostnames to fake though




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: