On 5/19/2015 3:31 AM, Kiss Gabor (Bitman) wrote:
[alt_names] DNS.1 = hkps.pool.sks-keyservers.net DNS.2 =
*.pool.sks-keyservers.net DNS.3 = pool.sks-keyservers.net DNS.4 =
keys.niif.hu
This part is unnecessary, the SANs are added by me the input is
discarded when generating the certificate.
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
On 05/19/2015 07:49 AM, Gabor Kiss wrote:
I am wondering if I can still get a certificate for
keys.techwolf12.nl, my server has been stable for over 3 months
now and I would like to add an extra layer of security.
Does anyone know how to get
[alt_names] DNS.1 = hkps.pool.sks-keyservers.net DNS.2 =
*.pool.sks-keyservers.net DNS.3 = pool.sks-keyservers.net DNS.4 =
keys.niif.hu
This part is unnecessary, the SANs are added by me the input is
discarded when generating the certificate. So you can simplify this to
Anyway the
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
Am 17.05.2015 um 06:52 schrieb Christian Felsing:
Hi,
I am wondering, if CAcert would offer CA solutions to handle this
type of special applications. I can imagine a sub CA which offers
a web service (authenticated by a specific client
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
Hi,
Am 14.05.2015 um 13:02 schrieb Christiaan de Die le Clercq:
Hi!
I am wondering if I can still get a certificate for
keys.techwolf12.nl, my server has been stable for over 3 months now
and I would like to add an extra layer of security.
Hi!
I am wondering if I can still get a certificate for keys.techwolf12.nl,
my server has been stable for over 3 months now and I would like to add
an extra layer of security.
I've emailed Kristian a few times now without getting a response.
Does anyone know how to get an certificate?
--
Kind