(imported topic written by SystemAdmin)
What is the certificate that is used for the console and where is it located in the install? Is it part of the masthead? I have a few security findings regarding the console certificate specifically that need to be addressed.
-
SSL Certificate with Wrong Hostname - The common Name (CN) of the SSL certificate presented on this service is for a different machine.
-
SSL Certificate Cannot Be Trusted - The servers X.509 certificate does not have a signature from a known public certificate authority. This situation can occur in three different ways, each of which results in a break in the chain below which certificates cannot be trusted. First, the top of the certificate chain sent by the server might not be descended from a known public certificate authority. This can occur either when the top of the chain is an unrecognized, self-signed certificate, or when intermediate certificates are missing that would connect the top of the certificate chain to a known public certificate authority. Second, the certificate chain may contain a certificate that is not valid at the time of the scan. This can occur either when the scan occurs before one of the certificates not Before dates, or after one of the certificates not After dates. Third, the certificate chain may contain a signature that either didn’t match the certificates information, or was not possible to verify. Bad signatures can be fixed by getting the certificate with the bad signature to be re-signed by its issuer. Signatures that could not be verified are the result of the certificates issuer using a signing algorithm that Nessus either does not support or does not recognize. If the remote host is a public host in production, any break in the chain nullifies the use of SSL as anyone could establish a man in the middle attack against the remote host.