[cisco-voip] Renewing Expressway E Cert

Anthony Holloway avholloway+cisco-voip at gmail.com
Thu Apr 23 02:16:25 EDT 2020


I think I could have written a piece of that better....

"...which is at a random/unpredictable time, where it will not for port 80
traffic to port 443 for a very specific GET Request to a very specific URL."

I think that's better.  Anyway, I read it in the documentation, so if
what I wrote is confusing, just read the docs.  1:00am email replies.
sheesh!

On Thu, Apr 23, 2020 at 1:13 AM Anthony Holloway <
avholloway+cisco-voip at gmail.com> wrote:

> First and foremost, the document describes how port 80 is used
> pretty well.  It goes on to say that its no less secure than port 443,
> because the same underlying program/process answers to both, thus is
> susceptible to the same attacks.
>
> People think it's less secure because it's clear text communication, but
> that's not pertinent to how people attack a host.  It is however, how you
> intercept communications, and then use that information to your advantage.
>
> However, the document also describes how port 80 is auto redirecting all
> traffic to 443 by default, until the renewal process starts, which is at a
> random/unpredictable time, and is only changed to redirect port 80 traffic
> to 443 for a very specific GET Request to a very specific URL.  In which
> case, the port 80 traffic is then redirected to another separate web server
> instance which is spun up just in this moment to handle the comms with
> let's encrypt, and as soon as it's done, the web server instance is turned
> off, and all port 80 traffic is again redirected to 443.
>
> So, the security of the system is actually pretty tight.  Is it 100%?
> probably not.  But then again, what truly is 100% secure?
>
> On Wed, Apr 22, 2020 at 3:42 PM Riley, Sean <SRiley at robinsonbradshaw.com>
> wrote:
>
>> Thanks for the reply and cliffs notes about the setup.  My security team
>> has concerns with having port 80 open to facility the Let’s Encrypt
>> process.  Documentation states something about allowing the built in
>> protections without giving much info on what those protections are.
>>
>>
>>
>> I would love to be able to set it and forget it.
>>
>>
>>
>> *From:* Anthony Holloway <avholloway+cisco-voip at gmail.com>
>> *Sent:* Friday, April 17, 2020 4:23 PM
>> *To:* Riley, Sean <SRiley at robinsonbradshaw.com>
>> *Cc:* cisco-voip at puck.nether.net
>> *Subject:* Re: [cisco-voip] Renewing Expressway E Cert
>>
>>
>>
>> *WARNING: **External Email *
>> ------------------------------
>>
>> This might be an unpopular opinion, but I think using the free certs
>> provided by let's encrypt, coupled with it being automatic from now on,
>> it's just an unbeatable combination.
>>
>>
>>
>> Here are my cliff notes:
>>
>>
>>
>> Reference Document:
>>
>>
>> https://www.cisco.com/c/en/us/td/docs/voice_ip_comm/expressway/config_guide/X12-5/exwy_b_certificate-creation-use-deployment-guide/exwy_b_certificate-creation-use-deployment-guide_chapter_0100.html
>>
>>
>>
>> High Level Steps:
>>
>>    1. Expressway 12.5.7 to avoid ACMEv1 vs ACMEv2 registration issues (
>>    https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvr82346)
>>    2. For your Unified CM registrations domains don’t use parent domain
>>    only (E.g., company.com), switch to CollabEdgeDNS format instead
>>    (E.g., collab-edge.company.com), because you’ll need that in the next
>>    step
>>    3. DNS A records for the Expressway-E FQDN and the CM registration
>>    domains
>>    4. Upload the root and intermediates for Let’s Encrypt (needed on
>>    both Expressway-E and Expressway-C) (certs are linked in documentation)
>>    5. Enable the ACME client on Expressway-E and supply any email
>>    address you want to link to this registration (This creates your account
>>    with Let’s Encrypt)
>>    6. Generate a new CSR (Server Certificate Only, Domain Cert Was Not
>>    Needed)
>>    7. Click button to Submit CSR to ACME
>>    8. Click button to Deploy New Certificate on Expressway-E
>>    (documentation states this is non-service impacting)
>>    9. Setup the automatic scheduler so you never have to deal with this
>>    again
>>    10. Sit back, relax and enjoy free shit
>>
>>
>>
>>
>>
>>
>>
>> On Fri, Apr 17, 2020 at 1:43 PM Riley, Sean <SRiley at robinsonbradshaw.com>
>> wrote:
>>
>> We had our Cisco partner setup our Expressways a couple of years ago.  It
>> is a cluster with 2 E’s and 2 C’s currently at v 12.5.7 using for MRA.  I
>> have been managing them, installing updates, troubleshooting etc.  The
>> public Edge cert is up for renewal.  Can anyone provide advice on renewing
>> this cert?  I am planning on just renewing with the same cert provider, but
>> was interested in if there is anything to watch out for.  Example, will
>> there be a service interruption when replacing the cert?  Or just install
>> the new cert/pk and rest easy?
>>
>>
>>
>> Thanks in advance.
>>
>>
>>
>> Sean.
>>
>> _______________________________________________
>> cisco-voip mailing list
>> cisco-voip at puck.nether.net
>> https://puck.nether.net/mailman/listinfo/cisco-voip
>>
>>
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <https://puck.nether.net/pipermail/cisco-voip/attachments/20200423/ca7e6d18/attachment.htm>


More information about the cisco-voip mailing list