Are self-signed SSL certificates less secure?


Aloso

I'm using a self-signed SSL certificate on the front page for the prom. I know almost everyone uses the site personally, so even if the browser shows a warning, I can assure them that the certificate is trusted.

The question is: if I use this self-signed certificate, and my classmates visit the site anyway, are they also less secure against hackers, malware attacks?

The site does not require the highest security: the only purpose of the site is to chat and order tickets; the payment does not take place on the site !

edit:

No warning will be displayed when you enter an unencrypted website. Does this mean that no encryption is better than homemade encryption? I do not think so!

Steffen Ullrich

Self-signed certificates can provide encryption just like normal certificates. But it doesn't provide the usual logo. But proper identification is essential for HTTPS, because otherwise it is possible to impersonate the server and the person in a man-in-the-middle attack, which effectively renders the encryption useless.

You can also provide proper identification for self-signed certificates by giving everyone who likes to connect to your site the basic information that they should get the certificate beforehand, i.e. by providing the certificate itself or a thumbprint. Of course you have to do it in a safe way (eg out of band during connection). You should also somehow ensure that others are actually comparing the certificate it gets to the one they expect, rather than simply clicking on it. This works if only a few people will visit the site, but it won't scale with more visitors.

Another problem with not having a certificate issued by a public CA is when SSL listening is done. This is usually a venue in a company, but there are several antivirus products that can do this as well. In this case, sites using unverifiable certificates are often simply blocked by SSL interception and need to explicitly add exceptions.

Related


Are self-signed SSL certificates less secure?

Aloso I'm using a self-signed SSL certificate on the front page for the prom. I know almost everyone uses the site personally, so even if the browser shows a warning, I can assure them that the certificate is trusted. The question is: if I use this self-signed

Trusted SSL certificates appear as self-signed

Oracle: I have a trusted TLS certificate provided by DigiCert that I am trying to use in a java/spring application exposing the rest api. I created a .p12 file with openssl which does the following:openssl pkcs12 -export -in mycertificate.cer -certfile mycerti

SSL: Understanding Self-Signed Certificates

Leviathan I would like to know how self-signed certificates are normally checked in SSL connection establishment. Let's take a look self-signed certificates: Client and server provide it with a self-signed certificateprivate key (e.g. created with OpenSSL) Whe

How to unblock self-signed SSL certificates?

VK1 Issue: User cannot log in to mobile app due to "Unable to contact server" Debug message: "TypeError: network request failed" Attempted fixes: restarted the server, verified that the db was running and nothing changed, restarted the VM the server was runnin

How to unblock self-signed SSL certificates?

VK1 Issue: User cannot log in to mobile app due to "Unable to contact server" Debug message: "TypeError: network request failed" Attempted fixes: restarted the server, verified that the db was running and nothing changed, restarted the VM the server was runnin

SSL: Understanding Self-Signed Certificates

Leviathan I would like to know how self-signed certificates are normally checked in SSL connection establishment. Let's take a look self-signed certificates: Client and server provide it with a self-signed certificateprivate key (e.g. created with OpenSSL) Whe

Trusted SSL certificates appear as self-signed

Oracle: I have a trusted TLS certificate provided by DigiCert that I am trying to use in a java/spring application exposing the rest api. I created a .p12 file with openssl which does the following:openssl pkcs12 -export -in mycertificate.cer -certfile mycerti

How to unblock self-signed SSL certificates?

VK1 Issue: User cannot log in to mobile app due to "Unable to contact server" Debug message: "TypeError: network request failed" Attempted fixes: restarted the server, verified that the db was running and nothing changed, restarted the VM the server was runnin

Ignore self-signed SSL certificates with Jersey client

Chris Salij: I am using Jersey client library to run tests against a rest service running on jboss. I have https setup fine on the server (running on localhost) with a self-signed certificate. However, whenever I run the test with the https url, I get the foll

Does OkHttp support accepting self-signed SSL certificates?

cesards: I'm providing a self-signed SSL certificate to a client who owns a server. I use Retrofit + CustomClient using wrapped OkHttp client: RestAdapter restAdapter = new RestAdapter.Builder().setEndpoint(Config.BASE_URL + Config.API_VERSION) .setClient(

Using Self-Signed SSL Certificates in iPhone Apps

Jose Ibanez I apologize in advance for this tough question. I'm having trouble with a self-signed SSL certificate and I'd like to document everything I've tried so far. I am developing an application that communicates with a REST service. The test server uses

PHP 5.6, MySQL, SSL and self-signed certificates

melt When upgrading to PHP 5.6 recently, I ran into some issues with secure connections to MySQL. This concerns MySQLi and PDO. Here is my setup: MySQLi: $db->ssl_set('/etc/mysql/certs/client-key.pem', '/etc/mysql/certs/client-cert.pem', '/etc/mysql/certs/ca-c

Does OkHttp support accepting self-signed SSL certificates?

cesards I'm working for a client that has a server with a self-signed SSL certificate. I'm using Retrofit + CustomClient with a wrapped OkHttp client: RestAdapter restAdapter = new RestAdapter.Builder().setEndpoint(Config.BASE_URL + Config.API_VERSION) .se

Ignore self-signed SSL certificates with Jersey client

Chris Salij: I am using Jersey client library to run tests against a rest service running on jboss. I have https setup fine on the server (running on localhost) with a self-signed certificate. However, whenever I run the test with the https url, I get the foll

Only use self-signed SSL certificates for web services

Sconz2 I have a web service that the client will have and I want to encrypt the data sent to the server. To test this, I used a self-signed SSL certificate. I know that when you use a self-signed certificate and you navigate to any address that uses that certi

Boost SSL verifies expired and self-signed certificates

Tim I'm using Boost's asio to connect to a site over HTTPS. I want it to succeed only if the certificate is valid, not expired, not self-signed, etc. Unfortunately it always seems to work anyway. Here is my code: try { asio::io_service ioService; asio:

Does OkHttp support accepting self-signed SSL certificates?

cesards: I'm providing a self-signed SSL certificate to a client who owns a server. I use Retrofit + CustomClient using wrapped OkHttp client: RestAdapter restAdapter = new RestAdapter.Builder().setEndpoint(Config.BASE_URL + Config.API_VERSION) .setClient(

Using Self-Signed SSL Certificates in iPhone Apps

Jose Ibanez I apologize in advance for this tough question. I'm having trouble with a self-signed SSL certificate and I'd like to document everything I've tried so far. I am developing an application that communicates with a REST service. The test server uses

PHP 5.6, MySQL, SSL and self-signed certificates

melt When upgrading to PHP 5.6 recently, I ran into some issues with secure connections to MySQL. This concerns MySQLi and PDO. Here is my setup: MySQLi: $db->ssl_set('/etc/mysql/certs/client-key.pem', '/etc/mysql/certs/client-cert.pem', '/etc/mysql/certs/ca-c

Ignore self-signed SSL certificates with Jersey client

Chris Salij: I am using Jersey client library to run tests against a rest service running on jboss. I have https setup fine on the server (running on localhost) with a self-signed certificate. However, whenever I run the test with the https url, I get the foll

Does OkHttp support accepting self-signed SSL certificates?

cesards: I'm providing a self-signed SSL certificate to a client who owns a server. I use Retrofit + CustomClient using wrapped OkHttp client: RestAdapter restAdapter = new RestAdapter.Builder().setEndpoint(Config.BASE_URL + Config.API_VERSION) .setClient(

Only use self-signed SSL certificates for web services

Sconz2 I have a web service that the client will have and I want to encrypt the data sent to the server. To test this, I used a self-signed SSL certificate. I know that when you use a self-signed certificate and you navigate to any address that uses that certi

Using Self-Signed SSL Certificates in iPhone Apps

Jose Ibanez I apologize in advance for this tough question. I'm having trouble with a self-signed SSL certificate and I'd like to document everything I've tried so far. I am developing an application that communicates with a REST service. The test server uses