mirror of
https://github.com/FiloSottile/mkcert.git
synced 2026-04-25 13:36:02 +03:00
[GH-ISSUE #390] Is it suitable for web applications on an internal company LAN? #258
Labels
No labels
TLS stack issue
Windows
bug
duplicate
duplicate
enhancement
help wanted
help wanted
pull-request
question
question
root store
waiting for info
No milestone
No project
No assignees
1 participant
Notifications
Due date
No due date set.
Dependencies
No dependencies set.
Reference
starred/mkcert#258
Loading…
Add table
Add a link
Reference in a new issue
No description provided.
Delete branch "%!s()"
Deleting a branch is permanent. Although the deleted branch may continue to exist for a short time before it actually gets removed, it CANNOT be undone in most cases. Continue?
Originally created by @haorein on GitHub (Aug 2, 2021).
Original GitHub issue: https://github.com/FiloSottile/mkcert/issues/390
I'm facing a situation where I'm setting up https communication for web applications that can only be accessed from the company intranet, and the certificate generated with mkcert worked perfectly. But I noticed that the last sentence of the readme says:
So, does mkcert still suit in this case?
@rfay commented on GitHub (Aug 2, 2021):
You would be better to use a regular wildcard certificate that's "real". mkcert really is for development purposes (and requires telling the client-side browser to accept it, which is a fundamental security issue).
Get a wildcard cert :)
@haorein commented on GitHub (Aug 2, 2021):
@rfay Thank you for your advice! just have one more question, why installing the root certificate to the client-side would cause security issue?
@rfay commented on GitHub (Aug 2, 2021):
First, you're installing a root CA on the server (or several of them). But it's a root CA that has no validation at all, no controls, no nothing.
Second, you're allowing all the clients in your local network to trust a cert/CA that has no process behind it, so any bad actor can create new trusted certs.