Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    Letsencrypt to issue wildcards!

    Scheduled Pinned Locked Moved Off-Topic & Non-Support Discussion
    12 Posts 6 Posters 2.9k Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • M
      maverick_slo
      last edited by

      Well for one ppl can see what san names you have on cert, and then access services you don't want to reveal just to everyone. Its public but still, wildcard can help in this area a bit. Also one cert for all easy maintainable etc…
      You just have to cover one and not many subdomains its easier... Also when youre adding subdomain, no more issuing new cert just use existing one and thats it..

      1 Reply Last reply Reply Quote 0
      • johnpozJ
        johnpoz LAYER 8 Global Moderator
        last edited by

        "Well for one ppl can see what san names you have on cert, and then access services you don't want to reveal just to everyone"

        What?  Could you please describe such a scenario?  So I setup a cert with common name server.domain.tld, I then setup a SAN so I can also hit it by IP 1.2.3.4 – how does that reveal something?

        Are you saying your creating cert with different fqdn so you have say

        san server.domain.tld
        san other.domaint.tld

        And then using this same cert on 2 different servers?  And your saying you want users to know about server but not other?  ???

        An intelligent man is sometimes forced to be drunk to spend time with his fools
        If you get confused: Listen to the Music Play
        Please don't Chat/PM me for help, unless mod related
        SG-4860 24.11 | Lab VMs 2.8, 24.11

        1 Reply Last reply Reply Quote 0
        • M
          maverick_slo
          last edited by

          Yeah sth like that. Not to use wildcard for security and depend on that so ppl cant see other domains but still… Every measure counts a little 😁
          For me it would just simplify deployment a lot, I dont care for other things so much...

          1 Reply Last reply Reply Quote 0
          • johnpozJ
            johnpoz LAYER 8 Global Moderator
            last edited by

            Using the same cert on multiple servers is pretty much borked out of the box.  You should use unique cert for each server or service your running.  And you sure shouldn't be putting multiple sans on a cert that are not for the unique service your using the cert for.

            JimP's scenario would be if your running say serviceA.domain.tld, serviceB.domain.tld, serviceC.domain.tld on the same host - you could simplify with using SAN for for this 1 cert for these different services.  But normally each service should use its own unique cert.  A san should really only allow for a different name or IP, etc.. that used for that specific service.

            An intelligent man is sometimes forced to be drunk to spend time with his fools
            If you get confused: Listen to the Music Play
            Please don't Chat/PM me for help, unless mod related
            SG-4860 24.11 | Lab VMs 2.8, 24.11

            1 Reply Last reply Reply Quote 0
            • M
              maverick_slo
              last edited by

              ehmmm…
              I know what SAN is used for.
              But if you have 1 host and 30 domains and even more subdomains SAN is a nightmare to maintain.
              Wildcard will solve my problems completley because there will be one cert for each domain and no more issuing new certs for that domain subdomains (now if you add subdomain you have to issue new cert or add san name to existing one).

              1 Reply Last reply Reply Quote 0
              • S
                Soyokaze
                last edited by

                @jimp:

                Curious, what do you see as your potential use case for them?

                I use WC for HAProxy instances on pfSense for HTTP/S redirection. It is much easier not to mess with certificate re/issue and reconfiguring HAProxy for another certificate.
                But I only have a bunch of sub-domains on one 2nd level domain.

                Need full pfSense in a cloud? PM for details!

                1 Reply Last reply Reply Quote 0
                • johnpozJ
                  johnpoz LAYER 8 Global Moderator
                  last edited by

                  "I know what SAN is used for."

                  If you think you should be putting different services names and IPs and using these certs on multiple devices.. And are worried about the SAN leaking info that is shouldn't. Then I question your understanding of their use ;)

                  Completely agree with you and what jimp was stating is that if you are running a webserver and you have a bunch of subdomain sites on this server that wild card would make it easier..  But this clearly could be accomplish with SANs or better even would be to run them with their own unique certs.

                  So you just want wildcards because your lazy ;)  And don't want to correctly use unique certs for your different services/sites/etc  And just 1 cert to do it all and not even have to worry about adding sans to it..

                  An intelligent man is sometimes forced to be drunk to spend time with his fools
                  If you get confused: Listen to the Music Play
                  Please don't Chat/PM me for help, unless mod related
                  SG-4860 24.11 | Lab VMs 2.8, 24.11

                  1 Reply Last reply Reply Quote 0
                  • M
                    maverick_slo
                    last edited by

                    I use SANs proper way. Many people don`t.

                    I`m lazy, wildcard is great for me and many more.

                    Why bother with SANs and adding every single subdomain on it?
                    Is it more secure? - NO
                    Is it safer? - NO
                    Is it more practical? - NO

                    The only thing is…. If you have to revoke it, then you have quite a lot of work to do to replace cert everywhere if you don`t have the automation to do it. But since certs are valid for 3 months and in the future maybe less you should have automation deployed already ;)

                    1 Reply Last reply Reply Quote 0
                    • M
                      MasterX-BKC- Banned
                      last edited by

                      it will greatly help those who use a lot of subdomains, or have services where a lot of subdomains point to the same server, and even the same virtual host, but performs different actions based on what subdomain name is used.  It opens up a lot more flexibility in their use.

                      1 Reply Last reply Reply Quote 0
                      • Y
                        yon
                        last edited by

                        i am support this, i have a lot domains and sub domains, and use for iis10 , no good ways auto renew and bind these cert. lets cert time is so short.  :)

                        If you are interested in free peering for clearnet and dn42,contact me !

                        1 Reply Last reply Reply Quote 0
                        • First post
                          Last post
                        Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.