My Synology NAS just got a UI to request and update certs.
It certainly makes life simple - it only requires that the lets encrypt servers can access the machine that the cert is being generated from.
It would be great to have something like this in merlin firmware.
Apparenltyy not - so unsure if you are asking that rhetorically or not? Though when i follow that link where am i supposed to go next?Did you read project goal?
I agree there is a cost benefit to that that needs to be thought about. But i would argue a)the service only needs to be open for the length of time to request the cert / renew it (seconds). B) many (most?) people putting SSL cert on their ASUS router is so they can expose multiple services and in some case the admin UI to the web. At least that's what the guides on this site seem to mostly be about.it would require internet accessible web service on the router, which means a lot of security implications.
All for what? to not need to add router cert to local repo?
I agree there is a cost benefit to that that needs to be thought about. But i would argue a)the service only needs to be open for the length of time to request the cert / renew it (seconds). B) many (most?) people putting SSL cert on their ASUS router is so they can expose multiple services and in some case the admin UI to the web. At least that's what the guides on this site seem to mostly be about.
I assume you would be against letsencrypt modules being in the build for the same reason - i.e. this i not about UI but having the modules and scripts there that can be used? If so i at least understand your perspective but i believe for each person it is a cost benefit analysis of risk vs benefits of opening ports or not. Personally i have a whole bunch of services open to the web and I am happy have enough process and procedures to mitigate the risks to my level of acceptance.
What do you mean proprietary? the main httpd is open source AFAIK. aiclouds is not, many of us are quite ok exposing the std httpd; same risk profile as vpn etc. but i understand if that's not acceptable in your eyes, everyones approach to risk is different.
i dont think any one is advocating it -it is all about risk management, if you are connected to the internet you have risk no matter what you are doing! i am happy i can manage that risk with 21 years of IP networking security experience. is it risk free? no, but there is on old saying one port or 65k ports open - its all the same difference..... port hijacking is a bitch
i'll scare you more, i even make extensive use of upnp
thanks for the link!
do you have link to any articles that go deeper, i keep finding stuff like this and it seems to relate to things other than httpd
http://www.pcworld.com/article/3036...over-insecure-routers-and-cloud-services.html
given the detail in the FTC report and the twenty years of audit, one would hope asus are now more highly motivated on security. the aicloud bypass was pretty serious, it is unclear to me if the csfr issues in the main webui still exist....
the ftc report makes for interesting reading https://www.ftc.gov/system/files/documents/cases/160222asuscmpt.pdf
Hehe, be careful with your many assumptions.
You are right about CSRF, I was looking for proven vulnerabilities on asus routers and CVE type reports specifically.
thanks, any ideas why they used the httpd that they did instead of using something like nginx... would seem a lot of weight to bear to doing something proprietary..?
you can have https only, it doesnt require a CA signed cert.
Welcome To SNBForums
SNBForums is a community for anyone who wants to learn about or discuss the latest in wireless routers, network storage and the ins and outs of building and maintaining a small network.
If you'd like to post a question, simply register and have at it!
While you're at it, please check out SmallNetBuilder for product reviews and our famous Router Charts, Ranker and plenty more!