Disadvantage of using a internal CA issued certificate? Why is it not common?
Solved! Go to Solution.
Nominating a forum post submits a request to create a new Knowledge Article based on the forum post topic. Please ensure your nomination includes a solution within the reply.
well the main disadvantage of this is that this CA is not trusted by the browsers and systems by default. You will always manually have to install this as trusted ca on every system that needs the verfiy your cert.
Thus there is cases where there is no alternative to that e.g. Deep Packet Inspection (SSL Inspection). This needs a sub-ca or ca cert to work (due to the way it works) which you cannot buy (sub-ca) or afford (ca).
--
"It is a mistake to think you can solve any major problems just with potatoes." - Douglas Adams
well the main disadvantage of this is that this CA is not trusted by the browsers and systems by default. You will always manually have to install this as trusted ca on every system that needs the verfiy your cert.
Thus there is cases where there is no alternative to that e.g. Deep Packet Inspection (SSL Inspection). This needs a sub-ca or ca cert to work (due to the way it works) which you cannot buy (sub-ca) or afford (ca).
--
"It is a mistake to think you can solve any major problems just with potatoes." - Douglas Adams
Would you recommend?
thank you sw2090.
Could anyone give me any example?
would it affect the efficiency of the hardware?
Thanks.
I do not think it affects the efficiency of the hardware.
If not for SSL Inspection you could use Lets Encrypt or buy a certificate to ensure it is trusted by the browsers by default. This would only affect the FGT Webinterface here though.
For SSL Inspection you need a certificate authority (CA) or a sub CA because you need a certificate that is able to sign new certificates.
This is because SSL Inspection (Deep Packet Inspection is meant here) works Man in the Middle . (MitM). This means the FGT needs to decrypt encrypted traffic (e.g. https) and then re-encrypt it to hand it on to the client. With re-encryption it needs to keep the Common Name or/and Subject Alternative Name(s) of the certificate the traffic was originally encrypted with. Otherways your Browser would error out because the cert does not match. And it cannot use the original certificate to re-encrypt because that would require having the private key which only the original sender has.
Plus one advantage of a self-signed cert is that you can set the expiry date free. Letsencrypt only does 2 months e.g. than you have to get a new cert. Most purchaseable certificates are at 1/2 year and then you have to buy a new one.
--
"It is a mistake to think you can solve any major problems just with potatoes." - Douglas Adams
Select Forum Responses to become Knowledge Articles!
Select the “Nominate to Knowledge Base” button to recommend a forum post to become a knowledge article.
User | Count |
---|---|
1547 | |
1031 | |
749 | |
443 | |
210 |
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2024 Fortinet, Inc. All Rights Reserved.