infosec

Notes for a 2-Tier Microsoft Windows PKI

Implementing a public key infrastructure (PKI) is a recurring task for me. More and more customers tend to implement a PKI in their environment. Mostly not to increase security, rather then to get rid of browser warnings because of self-signed certificates, to secure intra-org email communication with S/MIME, or to sign Microsoft Office macros. tumbledore / pixabay.com/ Pixybay License What is a 2-tier PKI? Why is a multi-tier PKI hierarchy a good idea?

EAPoL forwarding on NEC VoIP phones

A customer is running their PCs behind their VoIP phones. Nothing unusual, most VoIP phones I know have an embedded ethernet switch, so that you only need one cable to connect PC and VoIP phone to your network. [caption id=“attachment_3876” align=“alignnone” width=“640”] Martinelle/ pixabay.com/ Creative Commons CC0[/caption] As part of a network security project, my colleague and I implemented IEEE 802.1X port-based Network access control at one of our customers networks.