Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

> First, all these certificates in the web PKI have SANs in them.

Yes, and technically true is the best variety of true, but… Usually people don't refer to certificates where “Subject” is equal to the one and only “Subject Alternative Name”, as SAN certificates.

> So what you're actually talking about are certificates with two or more specific DNS names rather than a single wildcard.

If we are going to nitpick over the SAN designation a basic wildcard certificate is usually a SAN cert too, by the same definition. They have (at least mine always have had):

    Subject =
            “CN = *.domain.tld”
    Subject Alternate Name = 
            “DNS Name: *.domain.tld
             DNS Name: domain.tld”
(or similar for a wildcard hung off a sub-domain)

> "Hey, other than www.example.com what else gets asked in similar DNS queries?"

True, but only if those queries are hitting public DNS somehow. You can hide this by having your local DNS be authoritative for internal domains — your internal requests are never going to outside DNS servers. There could be leaks if someone who normally has access via VPN tries to connect without, but if you have something so truly sensitive that just knowing the name is a problem¹ then I hope your people are more careful than that (or your devices seriously locked down).

And I still say the easy workaround for this is names that only mean something internally. projectwhatthefuck.dev.company.tld is not going to mean much other than giving an attacker compared to projectousurpcompetitor.company.tld. Yes, they'll know the server name, and if it is publicly addressable they can connect to it, but if you have it properly configured they'll have to give it auth information they hopefully won't have before it hands over any useful information beyond the meaningless (to them) name that they already know.

--------

[1] Some of our contracts actually say that we can't reveal that we work with the other party, so technically² we could be in trouble if we leak the company name via DNS (bigwellknowmultinationalbank.ourservice.tld). Though when we offer a different name, in case the link between us can leak out that way, in those cases they've always declined.

[2] Really they don't care that much. They just don't want us to use their name/logo/other in promotional material.



Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: