Score:0

WWW A-record Hack for Internal Users No Longer Works on my Server 2022 AD Domain

zm flag

I have one of those notorious public websites for my company running on a third-party host that has the same domain name as our internal Active Directory domain network. So that our internal users can browse to that site, we have long had an internal A record for "www" that points to the external website's static IP address. That used to work. But now, if an internal user types "www.my-company.com", the browser throws an error "NET:ERR_CERT_COMMON_NAME_INVALID", crosses out the "https: in the URL, and prevents access to the site. The "advanced" error message says "This server couldn't prove that it's my-company.com; its security certificate is from .my-company.com. This may be caused by a misconfiguration or an attacker intercepting your connection."

I'm baffled. If I do an nslookup to internal DNS on "www.my-company.com", it correctly returns the website's public IP address. If the HTTPS wants a certificate, why is it not getting the certificate from the public site, rather than our internal domain server? Clearly, I don't understand something fundamental!

John Mahowald avatar
cn flag
Please edit your question to add detail on how exactly the certificates are different in your split-horizon DNS setup. Including the names entered into browser (www and not), IP it resolves to, the chain of CAs that signed it, and the cert's fingerprint.
Score:0
cn flag

Issue a certificate for DNS names example.com, www.example.com, and any other name for this web site. Use this certificate for https on all relevant web servers, both external and internal.

Some users will not remember www. in front. Unfortunately, to accommodate them it will be difficult to avoid web servers on AD DS directory controllers, if only to do a redirect. This is one of those internal web servers you might have, a hack to make things coexist even if the real hosting is external and not in your directory.


Add to your AD DS notes that the next time you build a domain, don't use the same domain name for internal and external. ad.example.com is a fine name, can exist with [email protected] email, and won't interfere with public web site example.com AKA www.example.com.

HighConcept avatar
zm flag
You lost me at "Issue a certificate". www.example.com is hosted by a third party. The web server on our sole AD DS directory is configured but unused. I suppose giving it something to do -- "if only to do a redirect" -- is the simple hack for this low-traffic situation.
John Mahowald avatar
cn flag
Edit your question to show the subject alternative names on the certificates as I asked. Every name the web site goes by should be on it, www. and without, probably. Repeat this for all relevant web servers, third party hosted included. If you don't manage TLS certs, tell them to fix it.
I sit in a Tesla and translated this thread with Ai:

mangohost

Post an answer

Most people don’t grasp that asking a lot of questions unlocks learning and improves interpersonal bonding. In Alison’s studies, for example, though people could accurately recall how many questions had been asked in their conversations, they didn’t intuit the link between questions and liking. Across four studies, in which participants were engaged in conversations themselves or read transcripts of others’ conversations, people tended not to realize that question asking would influence—or had influenced—the level of amity between the conversationalists.