On Tue, Jul 7, 2009 at 2:38 AM, ad...@gg-lab.net<ad...@gg-lab.net> wrote:
> Hi All,
>
> i have, hope, a very simple question (but no reply found on Google):
>
> using CA.pl i created a sefls signed certificate. And this is ok.
>
> Reading manpage of CA.pl i noticed that i can also create a Local CA.
>
> So, what's the difference between a simple self signed certificate and
> a certificate created with my own CA?

A self-signed certificate is basically its own authenticator.  It's
useful for only as long as it's good for, and there's no continuity of
administration.  It's also not useful for identifying anything (except
as "something that uses its own key to be signed").  If I were to
create a self-signed certificate purporting to be from Bank of
America, how would you know that it was legitimate?  How would you
know it was illegitimate?

Having a local CA means that when one certificate expires or otherwise
becomes unuseful ("I lost the private key to this certificate"), you
can simply issue another certificate... and clients that are set up to
accept your CA will automatically accept it without having to go
through the warning/exception process again.

> And, how can i create (with CA.pl if possibile) certificates for
> multiple domains? I've used as Common Name *.mydomain.tld, but it i
> reach mydomain.tld, i get an error.

You're looking for something called the subjectAltName extension.  For
information on how to set it, look at the manpage for
x509v3_config(5).

You'd want a line with:
subjectAltName=DNS:*.mydomain.tld,DNS:mydomain.tld

I'm not sure why this (most common) usage of subjectAltName isn't
given as an example in that manpage.

-Kyle H
______________________________________________________________________
OpenSSL Project                                 http://www.openssl.org
User Support Mailing List                    openssl-users@openssl.org
Automated List Manager                           majord...@openssl.org

Reply via email to