On Wed, Oct 24, 2012 at 2:37 PM, Dave Thompson <dthomp...@prinpay.com> wrote:
>>From: owner-openssl-us...@openssl.org On Behalf Of Alan Buxey
>>Sent: Wednesday, 24 October, 2012 03:00
>>To: aurfal...@gmail.com; openssl-users@openssl.org
>>Subject: Re: Wild card SSL; use on multiple Apache servers
>
>>The wildcard is for a particular domain (* is value for any host
>>within it) . If your other server is in a different domain,
>>then it won't work.
>
> Right. Because the CA only verified your control of the domain
> that it issued the cert for; if you get a cert for fredsmith.com
> and could use it on a server that impersonates www.amazon.com
> you could steal billions of dollars from millions of people.
I believe you can go to TrustWave and get certificates for domains
outside your control
(http://blog.spiderlabs.com/2012/02/clarifying-the-trustwave-ca-policy-update.html).
Mozilla rewarded their bad behavior by continuing their inclusion
(https://bugzilla.mozilla.org/show_bug.cgi?id=724929).

So much for Trust as a commodity....

Jeff
______________________________________________________________________
OpenSSL Project                                 http://www.openssl.org
User Support Mailing List                    openssl-users@openssl.org
Automated List Manager                           majord...@openssl.org

Reply via email to