Thanks to ALL, I used all of your this to found my way
I finally got what I wanted using the configuration bellow, using multiple subjectAltName. I works with IE 6 and 7, Firefox 1.5, 2.0, AND Thunderbird and Outlook Express using imap and SMTP (TLS ans SSL). Then every time I update my DNS, adding a new domain I have to update my certificate. BUT then clients have to trust this new certificate ... this is annoying ! I will try using a CA root if I can avoid this disagreement. Maybe you already know the answer ? :-) Here is the command I used to genereate the working certificate, # /openssl req -new -x509 -outform PEM -keyform PEM -nodes \ -days 3650 -out cert.pem -keyout key.pem \ -config tmp.req.cnf and here is the config I used [ req ] distinguished_name = req_distinguished_name default_bits = 1024 prompt = no x509_extensions = v3_req string_mask = nombstr [ req_distinguished_name ] CN = *.foobar.com [ v3_req ] basicConstraints = CA:TRUE subjectAltName = @alt_names [ alt_names ] DNS.1=alpha.loc.customer.example.com DNS.2=beta.loc.customer.example.com DNS.3=gamma.loc.customer.example.com Here are interesting link I used as reference. The openssl-user thread named "Wildcard ssl certificate using subjectAltName" that showed me the way, with the useful sample by Victor Duchovni http://www.nabble.com/Wildcard-ssl-certificate-using-subjectAltName-t1103260.html the link http://wiki.cacert.org/wiki/VhostTaskForce contains explore way, but retain only the one using multiple subjectAltName found in http://wiki.cacert.org/wiki/VhostsApache?action=show : The CommonName is ignored if you have any SubjectAltName's so the best thing to do it to repeat the CommonName as a SubjectAltName. On 6/16/07, Goetz Babin-Ebell <[EMAIL PROTECTED]> wrote:
--On Juni 16, 2007 13:25:33 +0200 Alain Spineux <[EMAIL PROTECTED]> wrote: > Hello Hello Alain, > I would like to create a individual space for all my customers, using > their own domain name. > > For example > > debian.org -> debian.org.example.com > linux.org -> linux.org.example.com > uk.debian.org -> uk.debian.org.example.com > > I tried to create a wildcard certificate for example.com, but it only > works for foo.example.com > not for foo.bar.example.com > > That way, I can host the service on separate server, totally independent. > The only one that know them all is the DNS, that is the only one to > have a backup. You could stuff all host names in a subjectAltName extension... At least modern browsers should support it... Bye Goetz -- DMCA: The greed of the few outweights the freedom of the many
-- -- Alain Spineux aspineux gmail com May the sources be with you ______________________________________________________________________ OpenSSL Project http://www.openssl.org User Support Mailing List openssl-users@openssl.org Automated List Manager [EMAIL PROTECTED]