Geekzone: technology news, blogs, forums
Guest
Welcome Guest.
You haven't logged in yet. If you don't have an account you can register now.


View this topic in a long page with up to 500 replies per page Create new topic
1 | 2 

gzt

gzt
17160 posts

Uber Geek

Lifetime subscriber

  #1393802 24-Sep-2015 19:43
Send private message

nzerin: ok thanks guys, I will look into all these options. cry

If you want to post some specific information about your hosting/platform/software/version/configuration - you may get some very good advice here related to those components.



timmmay
20591 posts

Uber Geek

Trusted
Lifetime subscriber

  #1393840 24-Sep-2015 20:30
Send private message

MadEngineer: https://www.startssl.com

Any good?


SSL certificates are all roughly the same when it comes to encryption. The higher level ones validate that you are who you say you are, the cheaper ones give no such assurances.

Ragnor
8223 posts

Uber Geek

Trusted

  #1394903 26-Sep-2015 16:15
Send private message

MadEngineer: https://www.startssl.com

Any good?


Pros: Free class 1 ssl certificates, you pay to verify your identity for higher class certs instead of paying per cert like other providers.

Cons: Horribly designed annoying website, based in Israel so things that require manual approval/verification at their end can take a day or more due to time difference.



freitasm
BDFL - Memuneh
79314 posts

Uber Geek

Administrator
ID Verified
Trusted
Geekzone
Lifetime subscriber

  #1394911 26-Sep-2015 16:21
Send private message

I use RAPIDSSL for our certs.





Please support Geekzone by subscribing, or using one of our referral links: Quic Broadband (free setup code: R587125ERQ6VE) | Samsung | AliExpress | Wise | Sharesies | Hatch | GoodSync 


darylblake
1162 posts

Uber Geek

Trusted

  #1394989 26-Sep-2015 18:30
Send private message

If you are using cloudflare as your CDN you can use the cloudflare account. They have a product called Universal SSL.  

freitasm
BDFL - Memuneh
79314 posts

Uber Geek

Administrator
ID Verified
Trusted
Geekzone
Lifetime subscriber

  #1394990 26-Sep-2015 18:31
Send private message

But still good to have your own in case you need to disable Cloudflare or as a fallback.




Please support Geekzone by subscribing, or using one of our referral links: Quic Broadband (free setup code: R587125ERQ6VE) | Samsung | AliExpress | Wise | Sharesies | Hatch | GoodSync 


timmmay
20591 posts

Uber Geek

Trusted
Lifetime subscriber

  #1394991 26-Sep-2015 18:31
Send private message

darylblake: If you are using cloudflare as your CDN you can use the cloudflare account. They have a product called Universal SSL.  


That typically only encrypts from browser to CloudFlare, not to the server. It can be configured to connect to the server using an encrypted connection, but that is less common and more hassle. It's not secure end to end.

 
 
 

Trade NZ and US shares and funds with Sharesies (affiliate link).

mme

mme
161 posts

Master Geek


  #1395044 26-Sep-2015 20:35
Send private message

Just use a self signed CERT and use Cloudflare to serve the front end. Especially if PayPal handles the payment stuff

michaelmurfy
meow
13270 posts

Uber Geek

Moderator
ID Verified
Trusted
Lifetime subscriber

  #1395075 26-Sep-2015 22:34
Send private message

I just self-sign my certificates, enable SPDY support then use Cloudflare to serve up an actual certificate on my sites (see https://management.interwebz.co.nz as an example). For my own hosted stuff not behind Cloudflare I use StartSSL's free certificate which works really well however don't lose the private key for your certificate else you'll find you're forking out some coin for a certificate reset.




Michael Murphy | https://murfy.nz
Referral Links: Quic Broadband (use R122101E7CV7Q for free setup)

Are you happy with what you get from Geekzone? Please consider supporting us by subscribing.
Opinions are my own and not the views of my employer.


nzerin

17 posts

Geek
Inactive user


  #1395301 27-Sep-2015 19:08
Send private message

Wow thanks everyone, I will get onto the SSL cert and look into the Cloudflare service. cheers

timmmay
20591 posts

Uber Geek

Trusted
Lifetime subscriber

  #1395316 27-Sep-2015 19:46
Send private message

Don't get an SSL cert before you work out your whole game plan. Self signing is possible, if you do CloudFlare, but not with shared hosting, yes if you use a VPS.

Encryption in transit is still an illusion of security. Intercepting and decrypting traffic is pretty rarely a way to compromise a website. Breaking in via known vulnerabilities is far more likely, and easier.

UncleArthur
197 posts

Master Geek


  #1399925 5-Oct-2015 01:33
Send private message

Just to throw another angle:
At work we have a checkpoint firewall.

The other day I was doing some internet banking at work (yes it happens)... I took a look at the cert, and to my surprise the cert was not issued by my bank, but rather from our internal PKI.... Not cool.
So, it seems the checkpoint is doing the encryption between itself and the bank, then decrypting, inspecting the traffic, then re-encrypting between itself and my PC.
Wasn't getting a cert error or any indication this was happening because the PC I was using trusts our internal PKI.

Needless to say, not banking at work anymore...... So, the point is just because you see the padlock looking all happy.... If it's not your network you are on, still check the cert.

Dynamic
3869 posts

Uber Geek

ID Verified
Trusted
Lifetime subscriber

  #1400322 5-Oct-2015 14:39
Send private message

UncleArthur: Just to throw another angle:
At work we have a checkpoint firewall.

The other day I was doing some internet banking at work (yes it happens)... I took a look at the cert, and to my surprise the cert was not issued by my bank, but rather from our internal PKI.... Not cool.
So, it seems the checkpoint is doing the encryption between itself and the bank, then decrypting, inspecting the traffic, then re-encrypting between itself and my PC.
Wasn't getting a cert error or any indication this was happening because the PC I was using trusts our internal PKI.

Needless to say, not banking at work anymore...... So, the point is just because you see the padlock looking all happy.... If it's not your network you are on, still check the cert.

Well spotted.

Unfortunately this is going to get more and more common and trickle down to SMBs.  Google pushing for SSL on all web traffic means more web traffic is encrypted, and this will include web-borne malware.  To provide comprehensive protection, firewall vendors are having to inject themselves into the path of SSL connections to protect against this.  That was just the 'big guys', but I am seeing more SMB firewalls doing this.




“Don't believe anything you read on the net. Except this. Well, including this, I suppose.” Douglas Adams

 

Referral links to services I use, really like, and may be rewarded if you sign up:
PocketSmith for budgeting and personal finance management.  A great Kiwi company.


MadEngineer
4300 posts

Uber Geek

Trusted

  #1400571 5-Oct-2015 21:06
Send private message

Indeed - and how to employ a transparent proxy without doing the above.




You're not on Atlantis anymore, Duncan Idaho.

xontech
268 posts

Ultimate Geek


  #1402897 9-Oct-2015 10:20
Send private message

UncleArthur: The other day I was doing some internet banking at work (yes it happens)... I took a look at the cert, and to my surprise the cert was not issued by my bank, but rather from our internal PKI.... Not cool.
So, it seems the checkpoint is doing the encryption between itself and the bank, then decrypting, inspecting the traffic, then re-encrypting between itself and my PC.


That is quite bad form by your work. CheckPoint themselves go to great lengths to say that when you are doing HTTPS inspection on your firewalls that you NEED to set exceptions for certain traffic - i.e. financial and health. Your work is opening themselves up to issues if they don't follow these guidelines, as they, in theory, are privvy to personal details if they don't do this. And yes, in hacking terms this is referred to as a man in the middle.

I believe that HTTPS interception is currently the only way to be able to look inside encrypted traffic. And with an average of around 40% (rough memory recall) and growing of traffic in organistions being encrypted there is a real requirement to do this. But with the above caveats.

EDIT: words

1 | 2 
View this topic in a long page with up to 500 replies per page Create new topic





News and reviews »

Gen Threat Report Reveals Rise in Crypto, Sextortion and Tech Support Scams
Posted 7-Aug-2025 13:09


Logitech G and McLaren Racing Sign New, Expanded Multi-Year Partnership
Posted 7-Aug-2025 13:00


A Third of New Zealanders Fall for Online Scams Says Trend Micro
Posted 7-Aug-2025 12:43


OPPO Releases Its Most Stylish and Compact Smartwatch Yet, the Watch X2 Mini.
Posted 7-Aug-2025 12:37


Epson Launches New High-End EH-LS9000B Home Theatre Laser Projector
Posted 7-Aug-2025 12:34


Air New Zealand Starts AI adoption with OpenAI
Posted 24-Jul-2025 16:00


eero Pro 7 Review
Posted 23-Jul-2025 12:07


BeeStation Plus Review
Posted 21-Jul-2025 14:21


eero Unveils New Wi-Fi 7 Products in New Zealand
Posted 21-Jul-2025 00:01


WiZ Introduces HDMI Sync Box and other Light Devices
Posted 20-Jul-2025 17:32


RedShield Enhances DDoS and Bot Attack Protection
Posted 20-Jul-2025 17:26


Seagate Ships 30TB Drives
Posted 17-Jul-2025 11:24


Oclean AirPump A10 Water Flosser Review
Posted 13-Jul-2025 11:05


Samsung Galaxy Z Fold7: Raising the Bar for Smartphones
Posted 10-Jul-2025 02:01


Samsung Galaxy Z Flip7 Brings New Edge-To-Edge FlexWindow
Posted 10-Jul-2025 02:01









Geekzone Live »

Try automatic live updates from Geekzone directly in your browser, without refreshing the page, with Geekzone Live now.



Are you subscribed to our RSS feed? You can download the latest headlines and summaries from our stories directly to your computer or smartphone by using a feed reader.