• Moonrise2473@feddit.it
    link
    fedilink
    English
    arrow-up
    2
    ·
    7 hours ago

    But your endpoints are already available to everyone with just a nslookup.

    Maybe it’s more the permanent history of that, so if you run something like “radarr.example.com” then you wouldn’t have plausible deniability if you’re sued and the CT logs are presented as proof of your wrongdoing

    • xinayder@infosec.pub
      link
      fedilink
      English
      arrow-up
      1
      ·
      4 hours ago

      With Encrypted Client Hello you can have some more privacy on obtaining certificates for wildcard domains, IIRC.

    • Orygin@sh.itjust.works
      link
      fedilink
      English
      arrow-up
      1
      ·
      7 hours ago

      Not if you run a wildcard CNAME for your sub domains right ?
      Like I have *.mydomain.com point to my server, and there I have a different reverse proxy depending on the domain.