What exactly does one need to do to properly secure a server with SSL?
Say I just installed a linux distribution on a machine that is meant to act as a simple, home router, and it has an https web interface that I will be logging into from the internet.
Does leaving the default pregenerated ssl certificate that it came with pose a security threat, because everyone else that downloads the same distribution has the private key?
What are the disadvantages of having a self-signed certificate? Is it significantly less secure than having it signed by a CA? I don't really have thousands of users using my servers so I don't care that I need to confirm with firefox on clients that I want to proceed, as long as it still guarantees that no one can listen in on the communication.
I basically just followed the instructions found here:
http://www.akadia.com/services/ssh_t...rtificate.html
for generating a self-signed certificate. Is there anything else I must do to ensure no one can intercept the communication and decode it?
Bookmarks