Domain Validated/Level SSL Certificate with Green Bar in Browser - security

We are a startup from India, yet to register as a company.
However, in order to launch , we need to put up SSL certificate on our platform as we deal with critical info. Though the main concern is to have a Green Bar so that most of the browsers let the users in without a warning or anything. Is it possible to get a Domain Validated SSL Certificate that comes with a Green Bar?

The Green Bar will only happen with EV (Extended Validation) certificates, not with DV (Domain Validated). There is nothing you can do against this because this behavior is built into the browsers itself.

As Steffen points out, the green bar is a feature of Extended Validation certificates. These require additional validation of you're business by the certificate supplier, and tend to be significantly more expensive than domain validation certificates (probably to pay the additional staff required to do checks).
There's no way to get the green bar with domain validated certificates. If you could, it would entirely invalidate the existence of the EV certs.

This is very simple, you have to purchase a ssl certificate from your hosting provider and then copy the code in the ssl certificate manager into your hosting and put that code into your index page. To redirect the site from http: to https: ask to the hosting provider to redirect it and they will give you the redirection code.
If you site is built on a CMS platform, let me know. It has a different method I can help you if you still need help.

Related

How do I make site info appear in the address bar of a browser

I saw this :
Some site info appears. I use https and i only see "secure" on this place. How do they do this?
Certificates with extended verification.
These are the most expensive certificates and get them the hardest. In such certificates there is a so-called "green bar" - that is, at the entrance is not a site where such a certificate is installed in the address bar of the visitor's browser, a green line appears in which the name of the organization that received the certificate will be indicated.
Unfortunately, I seems that is a feature of specific browsers. It would seem that you have no control over the content.

Is it possible for a hacker to make a website clone with HTTPS?

I've seen this question around here on the forums only what I wish to know slightly differs from the ones I already read I suppose.
I will give you an example of the problem I am facing:
Let's say a hacker has managed to infiltrate the system and is able to spoof a DNS. Now if this hacker would clone a website, let's say this website is facebook, what I have read so far he would be making a HTTP website, because HTTPS would show up as faulty.
Now what I'm wondering is that with modern SSL it would seem like everyone is able to get his own certificate for his website. So if someone would connect to that website it would say the connection is trusted because it's SSL with a legit connection.
So what if this hacker would add a certificate to his cloned/spoofed phishing website? Wouldn't this mean that me as a user would go to his facebook page, and in the search bar it would say the connection is legitimate ( Because he added a certificate ) ? Because if that would be the point it would be necessary to check the certificate of every website I open at all times to see if it's actually the certificate that belongs to facebook (For example.)
Please let me know if anyone has any knowledge about this I am very curious to see how this works!
Provided that
Let's say a hacker has managed to infiltrate the system and is able to
spoof a DNS.
means that the attacker has control over the records for the name facebook.com (in orther words, he can point www.facebook.com to an IP of his choice) then yes, your scenario is correct.
He would
redirect www.facebook.com to site of his
buy a certificate for www.facebook.com
Someone going to that site would then see (www.facebook.com would be the domain)
This means that the traffic to access to this site is correctly secured between the browser and that site, and nothing else. Specifically, this does not tell if the site actually belongs to Facebook.
There are some sites which go one step further, with Extended Validation Certificates, where the issuer does some checks to "ensure" that the certificate is delivered to the actual owner of the service. You the see something like
As you can see, the owner of the site is visible right on the toolbar. Other browsers usually use a bright green toolbar to signal such sites.
Not sure if that is what you're asking, but you have trusted CAs imported to your browser (by default).
The attacker would need to have a key signed by trusted authority for this particular domain. I do not expect that to happen.
Another option would be breaking the key - very unlikely with current technology/regular updates made by major browser providers.
Major browsers providers are deprecating vunerable alghorighms to make sure you're OK.
For instance - Recently for that reason SHA1 got depreceated.
See here for more details on SHA1:
https://blogs.windows.com/msedgedev/2016/11/18/countdown-to-sha-1-deprecation/#pjXdGbOji3itBI7v.97
https://security.googleblog.com/2016/11/sha-1-certificates-in-chrome.html
https://www.google.com.au/search?q=firefox+sha1+deprecation&rlz=1C5CHFA_enAU714AU715&oq=firefox+sha1&aqs=chrome.1.69i57j0l5.2293j0j4&sourceid=chrome&ie=UTF-8
)
To summarize - your browser will let you know that there is 'something wrong' with the site (warning instead of green box).
Simply check the green box (and domain). Keep your browser updated.
Also for more information about SSL handshake see here: https://www.ssl.com/article/ssl-tls-handshake-overview/

What causes a "this connection is untrusted" issue?

I am new to development and at my new job we have this issue where on a sub-domain users are getting the error you see below but when they go to the base domain (e.g: domain.com) they don't see that.
I am supposed to solve this but not sure what might be causing it. I am not looking for somebody to solve this for me but if you can outline possible reasons why, i would be very thankful.
First thing: open up the "Technical details". They will give you more information, information you might or might not yet fully understand, but it still have the necessary info.
Basically, SSL (https) certificates are created for a specific domain. If the domain name changes (from e.g. example.com to foo.example.com), the certificate can not be used without a security warning popping out.
You need to create (either by self-signing or purchasing) separate SSL certificates for all the host names/domains under which the site will be accepted, to avoid the security warning. An alternate option is to purchase a wildcard certificate for the entire domain and sub tree (ie: *.example.com).
There are, to the best of my knowledge, no other ways around this; it's one part of how the HTTPS security is established.
When you're running HTTPS, you should have a different certificate for each server (subdomain) not each domain and the client should trust it if you don't want them to see this error.
You can use a wildcard certificate also. It would inherit through all subdomains.

How can I verify my website?

How can I make my website display a green label in the address bar of the browser:
Do I need to just use https or is it a more complex process?
Just using HTTPS (HTTP over SSL/TLS) does not give you the green address bar. You need an extended validation certificate, where the CA verifies your identity, and not just your domain ownership.
EV certificates are more expensive than simple domain validated certificates.
On security.SE we have a related question: What are the advantages of EV Certificate?
For example, the EV certificate at http://www.paypal.com/ will make the browser show a green bar and display "PayPal, Inc." next to it. This is designed not only to link the certificate to the domain owner (like standard domain-validated certificates do), but also link it to a more physical institution (here, PayPal, Inc.). To do this, the CA must verify that the named institution is indeed the one owning the domain.
You do need to make it HTTPS (which uses SSL or secure socket layer. ) This basically encrypts the data that goes to and from your website. This can be a lengthy process depending on your web host but usually involves purchasing a certificate from your host.
Yes the Green "Favicon" comes and differs from browser to browser and signalises the https connection
I would advice you not to try to implement this if you dont need it for security reasons

SSL, EV SSL, And URL Rewriting

We extensively use a third party app that we'll call thirdparty.com. thirdparty.com and mysite.com have a common navigation and look and feel, so to the users, they think they are always on mysite.com.
What we're going to do is start url rewriting 3rd.mysite.com to display thirdparty.com, to make it look even more like a seamless experience. This also gives us access to thirdparty.com's cookie, because it will be written as mysite.com.
thirdparty.com has an SSL cert that they use for a few select transactions (basically just login). When you call https://3rd.mysite.com/login, you get a 404 as mysite.com does not have SSL. So we're going to install an SSL cert to the 3rd.mysite.com subdomain to alleviate this problem.
The question is, if we install a EV SSL certificate, will the user see that, or will it relegate to the cert from thirdparty.com? I can think of reasons for this to work both ways, but am looking for a definitive answer. If they see the SSL cert, then there's no sense wasting money on the EVSSL. If they see the EVSSL, I'd think that would be a big opening for phishing if someone was doing this illegitimately.
Cheers
If user agents see the site as thirdparty.com they are going to require an https certificate for thirdparty.com. So if that's an EV cert, then they are indeed going to see the green glow. Of course, you will want to make sure any communications between thirdparty.com and mysite.com should be appropriately secure.
(BTW: rfc2606 for example domain names.)
Disclaimer: I'm not really competent to answer this question, but this is stackoverflow.

Resources