DeepSurface applies certificate validation to all SSL/TLS and HTTPS services it accesses. This validation can be performed in two ways:
When DeepSurface communicates with various external services that leverage SSL/TLS to communicate, it must validate these certificates (just like a web browser would validate any site's HTTPS certificate). The services this applies to include those discovered during scanning (e.g. WinRM, LDAPS), configured APIs for third-party security products, and those used to secure communications with authentication providers. DeepSurface can validate certificates in one of two ways:
The specific validation behavior varies from service to service and may be fine-tuned in some cases. TOFU is used only when traditional CA-based validation fails and the system is configured to fall back to TOFU. TOFU certificates are cached in the database and may be reviewed in the web interface. If a service's TOFU certificate changed for legitimate reasons, then DeepSurface will no longer be able to validate it, but administrators may remove or update the certificate in order to restore operation.
To review the certificates currently installed or cached, navigate to Setup > General Settings > Certificates. You will see a screen that looks like the following:
You can use the icons to download, view, add, edit, or delete a certificate.
The best way to ensure communications with external services continues uninterrupted over time is to obtain trusted certificates for every service and install them. If using an internal CA that your organization manages, we strongly recommend installing the CA certificate in DeepSurface so that internal server certificates can be validated without relying on TOFU. This reduces the long-term management overhead of DeepSurface and improves communications security.
DeepSurface supports local appliance authentication (through the DeepSurface Password Store) and Active Directory authentication brokered via the LDAP protocol. An "LDAP with NTLM" authentication provider must be configured to allow users to log into DeepSurface with AD credentials.
NOTES:
Once the LDAP with NTLM authentication provider is created, users must be created in DeepSurface in order for those users to be granted access.
DeepSurface usernames are case sensitive, regardless of authentication provider. While some authentication providers may allow case-insensitive names, the name a user types in at the login prompt must match the name and case of the user configured in DeepSurface.
A single configured LDAP with NTLM provider can support either a single domain, or multiple domains.
In order to provide secure communications, most protocols use some form of TLS (or its predecessor, SSL). For example, HTTPS security is based on this. In order for this to work, TLS services must present a cryptographic certificate to TLS clients when they initially connect. TLS clients then validate the certificate is legitimate and continue the conversation over secure (encrypted and authentic) channel.
A critical part of the certificate validation process is for TLS clients to ensure they know the identity of the server, which is typically represented as a domain name. The certificate presented by TLS servers contains this domain name and is signed by a trusted certificate authority (CA). The TLS client must (amongst other things) trust the authority used, validate the cryptographic signature on the certificate, and validate that the entity it is communicating with matches the desired host.
Operating systems and browsers come shipped with a list of trusted certificates and CAs. As an example, you can find the list of certificates trusted by your web browser in the settings section under.
Firefox: Preferences > search for "certificate" in Find in Preferences Chrome: Go to Settings and search for "certificate" Safari: Go to Settings and search for "certificate" Edge (Based on Chromium): Go to Settings and search for "certificate" in the Search settings box
In cases where an organization's servers are not exposed to the internet, it can be more challenging to obtain a certificate signed by a trusted commercial/public authority. In this case, it is common for organizations to create their own internal certificate authority for the purpose of signing certificates used only by internal services. In order for this to work, all internal hosts which may interact with these services must have a copy of the internal CA's certificate installed.
Note: It is possible for services to be configured with "self-signed" certificates where there is no explicit certificate authority involved. However, this means TLS clients will typically be unable to validate the authenticity of the certificate, in which case the TLS communications are no more secure than using an unencrypted protocol. It is possible to use Trust on First Use mechanisms to partially mitigate this risk, but overall it is best to use certificates signed by an authority that is trusted by all TLS clients.
If you want to know more about TLS and HTTPS digital certificates, here are some helpful links:
If TOFU authentication is enabled, then the first time a service is used, whatever certificate is provided will be recorded and used for future validation. After this first validation, if the certificate ever changes to a different, untrusted certificate, the connection will fail. There may be a legitimate reason the certificate changed. If you are confident you understand the reason, you can clear previously stored certificates in Administer > Certificates.
If an LDAPS or LDAP/StartTLS service presents a certificate that isn't signed by a known CA (e.g. a self-signed certificate), then DeepSurface will reject this certificate unless TOFU is enabled.
TOFU allows for a much simpler deployment while minimizing the window of opportunity for man-in-the-middle attacks. However, in high-security environments, DeepSurface Security recommends TOFU be disabled and that every service be configured with a signed certificate from a trusted CA.