Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

All our internal services are HTTPS. Then if a new hack is found to weaken wireless protocols we have that extra line of protection. Security in depth.

We serve strongly regulated industries and are subject to in-depth audits by clients on occasion, so perhaps my level of paranoia would be less warranted elsewhere. I'd still HTTPS everything though, even if the potential payoff is small because the required effort is too.



public certificates? Do you use wildcards, or are you unconcerned by leaking information like servernames via CT?


Public wildcard cert for centrally managed things.

Of course only a trusted few have access to the private parts of the certificate that covers centrally managed things. For local dev instances I suggest having a local only meaningless domain and a wildcard off that,

If we were using per name certs and name leaking were a significant issue we could instead sign with a local CA and push the signing cert out as trusted to all machines we manage.




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: