I generated 16 character (upper/lower) subdomain and set up a virtual host for it in Apache, and within an hour was seeing vulnerability scans.
How are folks digging this up? What’s the strategy to avoid this?
I am serving it all with a single wildcard SSL cert, if that’s relevant.
Thanks
androidul@lemmy.world 3 weeks ago
if you use Let’s Encrypt (ACME protocol) AFAIK you can find all domains registered in a directory that even has a search, no matter if it’s wildcard or not.
It was something like this crt.sh but can’t find the site exactly anymore
i_stole_ur_taco@lemmy.ca 3 weeks ago
Holy shit, this has every cert I’ve ever generated or renewed since 2015.
vf2000@lemmy.zip 3 weeks ago
Certificate Transparency makes public all issued certificates in the form of a distributed ledger, giving website owners and auditors the ability to detect and expose inappropriately issued certificates.en.wikipedia.org/wiki/Certificate_Transparency
Shimitar@downonthestreet.eu 2 weeks ago
This.
That’s why temping obscurity for security is not a good idea. Doesn’t take much to be “safe”, at least reasonably safe. But that not much its good practice to be done :)
sommerset@thelemmy.club 2 weeks ago
No. Not this.
Op is doing hidden subdomain pattern. Wildcard dns and wildcard ssl.
This way subdomain acts as a password and application essentially inaccessible for bot crawls.
Works very well
antrosapien@lemmy.ml 2 weeks ago
Holy shit… I thought it was DNS resolver selling these data
Lazarus@mastodon.xyz 2 weeks ago
@antrosapien @androidul
https://en.wikipedia.org/wiki/Certificate_Transparency