By the way, the list of SSL/TLS certificates issued to you (including subdomains) is public!

Linas Valiukas
3 min readSep 4, 2019

With the advent of Let’s Encrypt, the price of having a SSL/TLS-secured website has dropped to zero, and pretty soon every flower pot will be shipping with a OpenSSL build! But did you know that all the certificates, including lists of alias subdomains for the non-wildcard ones, are publicly audited information? Are you comfortable with the fact that others can find out about your production / staging environments (in the form of subdomains) simply by querying a public database?

Long story short, Google has decided to patch up some “structural flaws” with how certificates get issued, who can issue what certificate and to whom, in an attempt to curb rogue or hacked CAs. What they came up with is the Certificate Transparency project that publishes logs of issued SSL/TLS certs which browsers then check to spot the nasty ones.

Aside from browsers, there exist a few aggregators which collect said logs and make them searchable. About a year ago, I’ve used for running queries against a list of recently issued certificates, but now the website seems to be kind of broken, so you might want to try out a commercial alternative that I have googled up just today:

This tool is somewhat limited though, e.g. it lets you run up to 10 queries without registering:

I’m not sure if there’s any basis to me blurring out the publicly available data, but I won’t take the risk!

When you issue yourself a SSL/TLS certificate through, say, Let’s Encrypt, which includes both the domain and its subdomains, the domain (e.g. gets set as certificate’s Common Name (CN), and both the main domain and subdomains (, and get registered under certificate’s Subject Alternative Name (SAN). You can search for those on the Censys’s tool by picking the parsed.extensions.subject_alt_name.dns_names parameter — with that, you’d be effectively querying both CNs and SANs.

For example, let’s check out whether someone issued themselves a certificate for their RabbitMQ deployment! Enter the following query into the search box:

parsed.extensions.subject_alt_name.dns_names: rabbitmq*

We’re getting somewhere:

It turns out that quite a few users issued CA-signed certificates for their RabbitMQ deployments! Are they secure though? RabbitMQ has a web management UI plugin which is accessible at port 15672 by default, with guest:guest being the default credentials. Some users managed to change those:

It’s okay, login, no one’s a failure!

…yet others didn’t:

Obviously, this is a crypto startup!

I’ve also managed to find a RabbitMQ deployment with what appeared to be credit card numbers being processed as AMQP messages, but I didn’t check whether it was real data nor I’m going to post a screenshot with those, for legal reasons.

Some other things to search for to satisfy one’s curiosity:

  • Other popular tools with no auth by default or simple credentials, e.g. Solr, Elasticsearch, Redis.
  • Plethora of IOT gadgets.
  • Recently set up Wi-Fi routers.
  • Big-name domains, e.g. companies which do unsolicited credit ratings of all US citizens and occasionally get into hot water over their lacking security practices.

So, make sure that your operations aren’t more public that you’d like them to be! Prevent internal services from being accessed publicly, use self-signed certificates, or encrypt communication using a different OSI level altogether. Take care!

📝 Read this story later in Journal.

👩‍💻 Wake up every Sunday morning to the week’s most noteworthy stories in Tech waiting in your inbox. Read the Noteworthy in Tech newsletter.