Skip to content

Nuface Blog

隨意隨手記 Casual Notes

Menu
  • Home
  • About
  • Services
  • Blog
  • Contact
  • Privacy Policy
  • Login
Menu

Category: Cybersecurity

About Cybersecurity

企業 Internal PKI 架構實戰

Posted on 2026-01-122026-01-12 by Rico

從「能簽憑證」到「可長期營運的信任系統」 在很多企業裡,「Internal PKI」的現況往往是: 結果就是: PKI 變成一顆不敢碰的地雷,而不是企業的安全基石。 這篇文章不談理論、不談名詞,專注在一件事: 企業要如何真正「落地」一套可維運、可控、可交接的 Internal PKI 架構。 一、企業 Internal PKI 的實際目標是什麼? 在實務中,Internal PKI 的目標從來不是「跟公開 CA 一樣完整」,而是: 👉 重點是「可營運」,不是「技術炫技」。 二、實戰架構總覽(企業等級) 核心原則 三、Root CA:企業最重要、也最容易做錯的角色 Root CA 的正確定位 Root CA 實戰做法 Root CA 的存在,是為了「最壞情況還能活下來」。 四、Intermediate CA:企業 PKI 的核心戰場 為什麼企業一定要有 Intermediate? 因為企業一定會遇到: 👉 Intermediate CA 可以撤銷,Root CA 不行。 Intermediate CA 實戰建議 五、憑證分類策略(企業一定要做) ❌ 常見錯誤 ✅…

Read more

Docker + Apache Reverse Proxy + Internal CA Architecture

Posted on 2026-01-122026-01-12 by Rico

A Secure, Maintainable Design for Enterprise Environments As enterprise systems move toward containerization, a common set of requirements quickly emerges: This architecture is secure, scalable, and enterprise-friendly — but only if it is designed correctly.Poor design choices often lead to serious problems such as: This article presents a production-ready reference architecture for Docker + Apache…

Read more

Docker + Apache Reverse Proxy + Internal CA 架構設計實務

Posted on 2026-01-122026-01-12 by Rico

在企業內部系統逐步容器化之後,常見會出現這樣的需求: 這樣的架構,既安全、又符合企業資安與維運需求,但如果設計不當,也很容易踩到以下地雷: 這篇文章將從 企業實務角度,完整說明一套可長期維運的 Docker + Apache Reverse Proxy + Internal CA 架構。 一、整體架構目標 這個架構的核心目標有四個: Internet / Users│ HTTPS (Public Cert)▼+———————-+| Apache Reverse Proxy || (Docker Container) |+———————-+│ HTTPS (Internal CA)▼+———————-+| Backend Services || (Docker Containers) |+———————-+ Internal CA(Offline Root + Intermediate) 三、CA 架構前提(非常重要) 建議 CA 架構(簡述) 關鍵原則 四、Apache Reverse Proxy 容器設計 1️⃣ Apache 容器的角色…

Read more

Enterprise Internal CA Best Practices

Posted on 2026-01-122026-01-12 by Rico

Designing a Secure and Maintainable Internal PKI As enterprise IT environments evolve, the following trends are becoming standard: As a result, building an Internal Certificate Authority (Internal CA / Internal PKI) is no longer optional for medium-to-large enterprises. However, many companies make the same mistake: They can issue certificates — but they cannot operate a…

Read more

企業自建 CA 的最佳實務

Posted on 2026-01-122026-01-12 by Rico

在企業 IT 架構中,隨著以下需求越來越普遍: 自建 CA(Internal Certificate Authority) 幾乎已成為中大型企業的標準配置。 但實務上,很多企業的自建 CA: 這篇文章將從 企業等級的角度,說明「自建 CA 該怎麼做,才不會變成資安地雷」。 一、什麼情況下「一定要」自建 CA? 企業選擇自建 CA,通常不是為了取代公開 CA(如 Let’s Encrypt),而是為了解決 內部信任問題。 常見適用場景 👉 只要憑證不會被公開瀏覽器使用,自建 CA 就是合理選擇。 二、企業自建 CA 的基本架構(強烈建議) 正確的 CA 架構:兩層式(至少) 為什麼不能只用一層? 三、Root CA 的最佳實務(最重要) ✅ Root CA 必須 Offline ✅ Root CA 金鑰保護 ✅ Root CA 有效期限 四、Intermediate CA 的最佳實務(實際運作核心) Intermediate CA…

Read more

Postfix + Let’s Encrypt + BIND9 + DANE Fully Automated TLSA Update Guide

Posted on 2025-12-032025-12-03 by Rico

— Example: mail.it.nuface.tw (DNSSEC-enabled) 📌 Introduction DANE (DNS-based Authentication of Named Entities) brings strong, DNSSEC-backed authentication to SMTP over TLS. By publishing a TLSA record protected by DNSSEC, you can let sending MTAs verify: When using the recommended mode: You bind the certificate’s SubjectPublicKeyInfo fingerprint (SHA-256) into DNS. ❗ Why automation is mandatory? Let’s Encrypt…

Read more

Postfix + Let’s Encrypt + BIND9 + DANE TLSA 指紋自動更新完整教學

Posted on 2025-12-032025-12-03 by Rico

📌 前言 在上一章介紹 DANE 時,我們提到 DANE(DNS-based Authentication of Named Entities)透過 DNSSEC 加簽的 TLSA 記錄,讓寄件端 MTA 在進行 SMTP over TLS(port 25)時: 若使用 TLSA(3 1 1)模式,就表示綁定的是「伺服器公鑰指紋」。因此只要 你的憑證更新,公鑰可能跟著變動 → TLSA 記錄也必須同步更新。 Let’s Encrypt 憑證 90 天更新一次。若 TLSA 沒同步更新,就會造成使用 DANE 的收件端拒收郵件,例如: 因此: 🎯 憑證自動更新 + TLSA 自動更新 + BIND DNSSEC 自動簽署 = 必須全自動化 這篇文章將示範我在 mail.it.nuface.tw 伺服器上的完整自動化流程。 🧩 系統架構與前置條件 本文章以你的實際環境為例:…

Read more

Deploying DANE in Postfix

Posted on 2025-12-032025-12-03 by Rico

— Real-World Example with mail.it.nuface.tw and BIND9 0. Environment Overview Goal: 1️⃣ Generate TLSA data (3 1 1) from your certificate We’ll use this common combination: So the TLSA record will look like: TLSA 3 1 1 <fingerprint> Run this inside your mail container: You’ll get something like: Keep this value for the TLSA record….

Read more

如何在 Postfix 中部署 DANE

Posted on 2025-12-032025-12-03 by Rico

—— 以 mail.it.nuface.tw + BIND9 自建 DNS 為實例 0. 環境說明 目標:✅ 為 mail.it.nuface.tw:25 建立 TLSA 記錄✅ 在 BIND9 zone 中加入 DANE✅ 讓 Postfix 對外寄信時啟用 DANE 驗證對方憑證✅ 對外來信者提供 DANE 能驗證的憑證資訊 1️⃣ 從憑證產生 TLSA 指紋(3 1 1) 我們使用常見且實務上最好用的組合: 也就是: TLSA 3 1 1 <指紋> 在你的 mail 容器裡執行(或掛載憑證後,在主機跑也可以): 輸出會像這樣(示意): 這一長串 64 個十六進位字元,就是 TLSA 3 1 1 要用的值。 2️⃣…

Read more

DANE: DNSSEC-Based TLS Protection

Posted on 2025-12-032025-12-03 by Rico

📌 Introduction As mentioned in the MTA-STS article, SMTP over TLS is vulnerable to downgrade and MITM attacks. MTA-STS improves security but still relies on HTTPS, CA certificates, and DNS TXT records, which may be intercepted or manipulated. For environments requiring even stronger, cryptographically verifiable security, there is DANE (DNS-based Authentication of Named Entities). DANE…

Read more

Posts pagination

  • Previous
  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • Next

Recent Posts

  • Token/s and Concurrency:
  • Token/s 與並發:企業導入大型語言模型時,最容易被誤解的兩個指標
  • Running OpenCode AI using Docker
  • 使用 Docker 實際運行 OpenCode AI
  • Security Risks and Governance Models for AI Coding Tools

Recent Comments

  1. Building a Complete Enterprise-Grade Mail System (Overview) - Nuface Blog on High Availability Architecture, Failover, GeoDNS, Monitoring, and Email Abuse Automation (SOAR)
  2. Building a Complete Enterprise-Grade Mail System (Overview) - Nuface Blog on MariaDB + PostfixAdmin: The Core of Virtual Domain & Mailbox Management
  3. Building a Complete Enterprise-Grade Mail System (Overview) - Nuface Blog on Daily Operations, Monitoring, and Performance Tuning for an Enterprise Mail System
  4. Building a Complete Enterprise-Grade Mail System (Overview) - Nuface Blog on Final Chapter: Complete Troubleshooting Guide & Frequently Asked Questions (FAQ)
  5. Building a Complete Enterprise-Grade Mail System (Overview) - Nuface Blog on Network Architecture, DNS Configuration, TLS Design, and Postfix/Dovecot SNI Explained

Archives

  • January 2026
  • December 2025
  • November 2025
  • October 2025

Categories

  • AI
  • Apache
  • CUDA
  • Cybersecurity
  • Database
  • DNS
  • Docker
  • Fail2Ban
  • FileSystem
  • Firewall
  • Linux
  • LLM
  • Mail
  • N8N
  • OpenLdap
  • OPNsense
  • PHP
  • Python
  • QoS
  • Samba
  • Switch
  • Virtualization
  • VPN
  • WordPress
© 2026 Nuface Blog | Powered by Superbs Personal Blog theme