Wildcard cert? Or individual subdomain certs?

Currently reading
Wildcard cert? Or individual subdomain certs?

4,027
1,378
NAS
DS4l8play, DS202j, DS3623xs+, DSM 7.3.3-25847
What are the drawbacks of using wildcard certs?

Obviously setting up a new subdomain which uses an existing wildcard cert, is a few clicks easier, and cert renewal across multiple subdomains is simpler with a wildcard cert.

Are there security issues involved with using an LE wildcard cert, as opposed to managing individual subdomain certs?
 
An interesting question. I'm wondering how would something malicious benefit from successfully spinning up a virtual host vs would this be worse than just infecting an existing web service's files?

From a client point of view then I guess there is probably more trust that this particular service is the right one if it isn't using a wildcard.
 
Last edited:
I've been using a wildcard cert, primarily on the basis of "oh, isn't that easy", but I've not seen much that addresses its drawbacks... hence the question.

This got me thinking...

And since it is relatively simple to request LE certs for subdomains, I want to take the right path from a security standpoint.
 
If you read this and the linked report there are examples for why using wildcard certs can be a risk.

For an organisation that has a complex and diverse IT/OT deployment then managing domains and certificates will be an important part of administration. But in a home setup: how complex will it be; what is the reward for compromising the certificate vs just doing a ransomware of data?

Maybe in situations where you are running many secured services [on your NAS] then there is a heightened risk that a service implementation is weak and that could further compromise other services. Whether this means an attack target would be via a shared wildcard certificate, instead of just going around the underlying OS and to other services and data.

Anyway, I use multiple LE certs that have a few alternative names ... because I'm too lazy to manually setup a way to do wildcard cards and manually manage their distribution.
 
Last edited:
Largely my subdomains connect to my NAS' reverse proxy, and then onto a docker container, or other networked device (for example, NAS1, NAS2, NAS3...). In that scenario, all certs, whether wildcard, or individual subdomains, would reside on the primary NAS1 on which the reverse proxy is operating, limiting (?) my security risk to NAS1 ("all eggs in one basket").

Simplistically, I'm unsure whether individual subdomain certs offer added security, when they are all on the same machine.

I'm probably missing something basic with that philosophy...

Relatedly... since Cloudflare assumed management of my wildcard cert, there seems to be no way to prevent the renewal of the wildcard... short of closing my account. What a puzzle.
 
For an organisation that has a complex and diverse IT/OT deployment then managing domains and certificates will be an important part of administration. But in a home setup: how complex will it be; what is the reward for compromising the certificate vs just doing a ransomware of data?

Maybe in situations where you are running many secured services [on your NAS] then there is a heightened risk that a service implementation is weak and that could further compromise other services. Whether this means an attack target would be via a shared wildcard certificate, instead of just going around the underlying OS and to other services and data.

Personally I would agree with this statement. Coming from a large corporation where using a wild card cert is a huge no (from a security standpoint) we always use dedicated certs per service. Reason is that the they want to minimize the risk by not allowing a cert to compromised that will then effect multiple services all at once.

For a soho setup, and especially every xy months I would still use a wild cert then to tackle 20-30 individual certs for all the services. Security vs convenience I guess.
 
For a soho setup, and especially every xy months I would still use a wild cert then to tackle 20-30 individual certs for all the services

Thanks. For now, I'm staying with the wildcard cert. But I'm giving up on using npm to acquire it. Yesterday I discovered how simple certbot is (and discovered that the wildcard also covers the base domain), using...

sudo certbot --manual --preferred-challenge dns certonly -d *.mydomain.com

Now I need to sort out how to automate this to land the certs in the proper location, and to set a renewal. :)
 
wildcard cert always,
just use the Search tool on this forum regarding LE cert issues, and you will get 1000 reasons for the wildcard cert usage.

“nothing is for free”
or
“anything free is worth what you pay for it”
 

Create an account or login to comment

You must be a member in order to leave a comment

Create account

Create an account on our community. It's easy!

Log in

Already have an account? Log in here.

Similar threads

Okeedokee... I guess it's off to explore Google Domains...
Replies
6
Views
2,981
EDIT: Ok, not sure why. But after destroying the LE docker container and re-created it using a MACVLAN IP...
Replies
8
Views
6,154
  • Question
Methinks I've found an issue with the DDNS. Still can't explain the odd error with the Synology wildcard...
Replies
6
Views
2,144
  • Question
When you login to the NAS and experience this issue of the certificate, check what is reported as the...
Replies
13
Views
2,403
M
i use the built-in function in DSM to get the certificate. There was nothing more to do and everything...
Replies
11
Views
1,982
makon
M
Wildcard domains require DNS verification. Synology have no control over other people's DNS records hence...
Replies
23
Views
4,627

Welcome to SynoForum.com!

SynoForum.com is an unofficial Synology forum for NAS owners and enthusiasts.

Registration is free, easy and fast!

Back
Top