On Sunday, September 06, 2015 3:03:12 PM lee wrote:
> Fernando Rodriguez <frodriguez.develo...@outlook.com> writes:
> 
> > On Saturday, September 05, 2015 6:09:36 PM Mick wrote:
> >> On Saturday 05 Sep 2015 14:06:27 lee wrote:
> >> > Fernando Rodriguez <frodriguez.develo...@outlook.com> writes:
> >> > > On Saturday, September 05, 2015 1:05:06 AM lee wrote:
> >> > >> In this case, I happen to have full physical access to the server 
and
> >> > >> thus to the certificate stored on it.  This is not the case for, 
let's
> >> > >> say, an employee checking his work-email from home whom I might give 
> > the
> >> > >> login-data on the phone and instruct to add an exception when the 
> > dialog
> >> > >> to do so pops up when they are trying to connect.
> >> > > 
> >> > > As a workaround you can create your own CA cert. I tested with a 
windows
> >> > > self- signed cert (I guess the correct term is self-issued) and the
> >> > > openssl command will show two certs. The second is the CA.
> >> > > 
> >> > > http://datacenteroverlords.com/2012/03/01/creating-your-own-ssl-certifica
> >> > > te-authority/
> >> > 
> >> > They're saying:
> >> > 
> >> > 
> >> > "Whatever you see in the address field in your browser when you go to
> >> > your device must be what you put under common name, even if it’s an IP
> >> > address.  [...]  If it doesn’t match, even a properly signed certificate
> >> > will not validate correctly and you’ll get the “cannot verify
> >> > authenticity” error."
> >> > 
> >> > 
> >> > What's the solution for a server which can be reached by different fqdns
> >> > and IPs?  What if the fqdns and IPs it can be reached by change over 
the
> >> > lifetime of the certificates?
> >> 
> > [...]
> >
> > Wildcards  should do it. The browser will give you a warning but you don't 
> > care since all you want is encryption and your users already trust you.
> 
> True --- and the problem will be back again when seamonkey etc. decide
> not to accept certificates with wildcards anymore.
> 
> > The only thing that matters about that article is that you'll be signing 
your 
> > certificate with the CA ones so you get two certificates when you run the 
> > openssl command, the last one is the CA certificate. If you, or your users 
add 
> > trust to that one, anything you sign with it will be trusted.
> >
> > I only tried it with a windows server issued certificate which does all 
that by 
> > default.
> 
> Changing the key would be a last resort.
> 
> If I do that, should I use a SHA-3 key?  Would that work, or is SHA-3
> too new?

You don't need to change the private key, you'll just have another CA cert and 
private key that you can use to sign your existing certificate (and generate a 
signed one). I suppose you may even be able to use the same key for both.

> > Since it lets you open the exception dialog but just hangs when 
downloading 
> > the certificate I wonder if it has something to do with your OCSP settings. 
> > Check that they match mine:
> >
> > security.OCSP.GET.enabled false
> > security.OCSP.enabled 1
> > security.OCSP.require false
> >
> > everything else is true.
> 
> I checked, and we have the same settings.  It doesn't really hang, it
> does nothing when I try to get the certificate.  Does it do something
> when you try?

It downloads the cert as expected. When I do it from the error page I don't 
even have to do that because it's already downloaded. What does it says under 
"Technical Details" on the error page?

-- 
Fernando Rodriguez

Reply via email to