Troubleshooting Internal DNS with HSTS Challenges

0
9
Asked By TechieTurtle99 On

A few years back, we switched our internal DNS naming from a .local domain to a subdomain of our corporate domain (internal.company.co.uk). Our main corporate website enforces HSTS for all its subdomains, which is necessary since we host certain resources on subdomains (like images.company.co.uk). However, this has created substantial difficulties for us internally. Many management interfaces for devices and applications are served over HTTPS with self-signed certificates, which are blocked due to HSTS policy. We're aware that we can bypass this on a case-by-case basis using 'thisisunsafe' or by utilizing certificates from our internal CA, but many of these device management portals do not support automated or dynamic certificate renewal. As a small team, manually tracking and renewing a large number of certificates is operationally challenging. We are now considering changing our approach again and would like to hear suggestions, as the usual advice seems to parallel what we're already doing with internal DNS.

5 Answers

Answered By ServerSaviorX On

HSTS is definitely a pain for internal management, as you noted. Keeping your internal systems separate from external ones could save a lot of hassle in the long run. Also, look into automating your certificate renewals more thoroughly; it'll make life easier.

Answered By CodeWiz123 On

You might want to consider putting devices with self-signed certificates behind a reverse proxy like HAProxy. That way, you can automate the certificate renewals through the proxy, which simplifies the management process.

Answered By NinjaNetAdmin On

You've made a good choice moving to a corporate domain. Forget self-signed certificates in this case; go with trusted CA certificates. They cost very little and will save you headaches. Plus, you should automate as much as possible to prevent manual tracking.

Answered By ITGrump07 On

If you can't manage certificates properly right now, think about moving to a completely separate domain instead of just a subdomain. It might reduce HSTS headaches, but your users would need to be informed to trust both domains. Ideally, you should use trusted certificates for internal use, maybe look into automating with Let's Encrypt.

Answered By DevOpsGuru99 On

For external services you host, you can set your internal DNS to point to them correctly without needing certificates for internal management tasks. Just map your domains properly to resolve internally and externally. That way, you'll get the right certificates while keeping it manageable.

Related Questions

LEAVE A REPLY

Please enter your comment!
Please enter your name here

This site uses Akismet to reduce spam. Learn how your comment data is processed.