Installing new SSL server certs is like visiting the in-laws for Christmas dinner. It's so painful, you dread it for weeks in advance. Afterwards, the relief flows through you as you know you don't have to do that for another year or two.
The eagle-eyed will notice a new certificate for Financial Cryptography, as of a week back. There have been a number of improvements: it now includes all the AltSubjectNames according to the VHostsTaskForce recommendation. It's also installed with the new Class 3 root, which is the CAcert "high-verification" root (meaning that the identity of the issuer -- me -- was checked at least to 50 points worth).
(You will need to reset your Trustbar. You should need to reset your Petname. Weird - for me, Petname is stuck on the old name transferred to the new cert???)
Getting the right setup only took 3 goes. One effort failed completely. Second time, the script I used did not include the CommonName as well in the AltServerName list. Apache barfed on that version, giving an uninterpretable error. Re-rolled with the right list, this time it worked.
There are still issues. Hopefully by the time this one expires, 2 years from now, these other problems will be solved as well:
Readers sometimes ask why FC uses CAcert instead of forking out bux to the commercial companies. It's not a political statement, I'd frankly rather we could just use crypto without the hassle (names of well designed cryptosystems available on request). Here's some of my reasons for using CAcert:
Of course, not all is light, joy and bounty. Far from it, CAcert is only the least worst of a bad bunch, but if we want to address phishing something must be done. A couple of notable flaws in the CAcert process: Their docs are all scattered around and their processes have not been beaten up. The linkage from the relying party to the cert to the signer to the statement to the CPS is unclear (but that's common of all).
( Note to FC readers: CAcert's root is currently only being distributed into various Linux distros and now FreeBSD! For other platforms, you will need to travel to CAcert's root page to install the root into their browser by hand -- for Firefox users, click on the line that says Class 3 PKI Key Root Certificate (PEM Format) if want to be part of the CAcert community. For Safari, Konqueror, Opera, IE7 users ... I don't know. I tried to load the root into Safari but failed. )
Posted by iang at February 25, 2006 04:03 PM | TrackBackFYI, the Nokia 770 Internet tablet comes with CAcert's root certificate pre-installed in its Opera browser. It's the first commercial consumer product that I've seen that does that.
Posted by: Andreas Ehn at March 4, 2006 06:39 AMthe Nokia 770, at least mine (original nokia firmware) just doesn't warn on a "not secure site" status. I could load
http://financialcryptography.com, https://financialcryptography.com and https://www.financialcryptography.com without any difference in display, except the little lock on the addressbar (which presumably replaces the display of the protocol).
but positive news is that my safari only complains when I open the site with the https://www prefix. Leaving out the www works now fine with this certificate and the root certificate of cacert in my mac keychain.
Posted by: Matthias Subik at March 5, 2006 07:37 AMHa! OK the way the cert is structured is that the CN == financialcryptograph.com and the altSNs include that as well as the www.fc ... and other names.
So, what you could do is to also browse over to https://koalagold.com/ and to https://www.koalagold.com/ which are in the same cert as altSubjectNames. This is all according to the vHostsTaskForce recommendations.
Posted by: iang at March 5, 2006 08:51 AM