▲ | kstrauser a day ago | |||||||||||||||||||||||||
Consensus from friends after I posted that is that attackers monitor the Let's Encrypt transparency logs and pounce on new entries the moment they're created. Here I was using Caddy, which by default uses LE to create a cert on any hosts you define. I can definitely reproduce this. It shocked me so much that I tried a few times: 1. Create a new random hostname in DNS. 2. `tail -f` the webserver logs. 3. Define an entry for that hostname and reload the server (or do whatever your webserver requires to generate a Let's Encrypt certificate). 4. Start your stopwatch. | ||||||||||||||||||||||||||
▲ | lucb1e a day ago | parent [-] | |||||||||||||||||||||||||
Thanks! CT logs do explain it. So it's not actually the DNS entry or vhost, but the sharing of the new domain in a well-known place. That's making a lot more sense to me! I can see how that happens unwittingly though We also use CT logs at work to discover subdomains that customers forgot about and may host vulnerable software at (if such broad checks are in the scope that the customer contracted us to check) | ||||||||||||||||||||||||||
|