Free SSL Certificate Project 374
An anonymous reader writes "Do you have a website or run even a web server and want to secure the traffic between your visitors browser and the web site? Did you find out, that in order to make your site SSL aware, you'll need a SSL (Secure Sockets Layer) certificate? Are you also surprised to find out that such a certificate can cost you up to a few hundred dollars, valid for one year only? For what, you might ask yourself? Linuxlookup.com is running a small article on free SSL certificates."
sweet (Score:2, Interesting)
Maybe they should have written about... (Score:4, Funny)
Re:Maybe they should have written about... (Score:2, Funny)
Re:sweet (Score:5, Informative)
What you're paying for when you buy a certificate is not so much the certificate itself, but for the processes surrounding the issuing of said certificate. When getting a certificate, you must prove to the registration authority that you are who you are, and that you have the legal right to obtain a certificate for your organization. Only after this verification has taken place will you be issued a certificate from a trusted authority. But your users can examine the certificate's chain of trust, and verify who they're talking to. Impossible to do with a self-signed or otherwise untrusted certificate.
Well.... (Score:2, Insightful)
Well.. (Score:5, Insightful)
Besides, do you really trust people such as Verisign to actively control certs?
Re:Well.. (Score:4, Insightful)
Re:Well.. (Score:5, Insightful)
Re:Well.... (Score:5, Informative)
And getting one isn't the issue at all - you can generate as many as you want yourself - it's getting one that means something that's the issue.
Re:Well.... (Score:2, Insightful)
I agree. I believe the whole point of Verisign's and others' existence is to make sure that the name/organization that shows up on the cert is actually corresponding to the person they're handing it to. And such verification costs money, or at least should take more than a simple Web form.
The post on linuxlookup seems like a pretty corny ad for some hosting company anyway. Pfft!
Re:Well.... (Score:3, Insightful)
I think the SSL encryption part itself should be good enough, and all this trusted CA crap just needs to go away.
Re:Well.... (Score:4, Informative)
I can't begin to imagine why why you would say this [pkiforum.com].
In theory maybe (Score:5, Informative)
Anyone paying "hundreds" of bucks for a certificate is being scammed though. Much cheaper ones are available from people like GoDaddy [godaddy.com]. I can't see why anyone wouldn't just go for the $29 one, your users won't notice any difference between them unless they are particularly inquisitive and enjoy poking around obscure browser dialogues.
Re:In theory maybe (Score:2)
Re:In theory maybe (Score:3, Informative)
Re:In theory maybe (Score:3)
Re:In theory maybe (Score:4, Interesting)
Anyone have a different experience?
Re:In theory maybe (Score:5, Informative)
Generating a certificate/key-pair is trivial. You can do it yourself for free or have a 3rd party do it free or at mild to great expense.
In theory, a certificate is only useful in verifying the identity of a resource (server authentication of a web server in this case) so long as you trust the issuing authority, and therefore you take it on the issuing authority's word (cert is signed with the authority's private key) that the server at the end of https://companyA.com really belongs to companyA. You trust the issuing authority to have verified this fact for you. That's all server authentication consists of.
In theory, then, the critical question is 'what certificate authorities do you trust to make that kind of verification on your behalf?'
In general practice, however, all this boils down to is 'what certificate authorities are shipped as "trusted" on an out of the box install of the dominant platform/browser?' This, of course, includes Verisign, Thawte, and serveral others that have gone through both a PKI practices certification process and what must surely be an expensive business relationship with Microsoft.
So, as a server administrator, you either pay up for a cert from one of these widely "trusted" authorities, or explain to your users wy they should either import your CA as a trusted root, or otherwise deal with the warning messages that the browser will issue if your cert comes from anyone "untrusted", including yourself.
And, as has been alluded to, one you are past the server authentication usage of the PKI, the session key exchange for bulk encryption (SSL) can be handled equally well by any technically correct certificate/key-pair, regardless of the trust chain.
"much better" - pfft. (Score:3, Informative)
Internet Explorer 5.01 and higher
AOL 5 and higher
Netscape 4.7 and higher
Opera 7.5 and higher.
Safari on Mac OS X 10.3.4 or higher
Mozilla (all versions)
Firefox (all versions)
Re:Well.... (Score:2)
Self-signed certificates are definarly not new, you can do this with openssl on linux in about a handfull of commands [redhat.com] or in windows on IIS [xenocafe.com] (using the tool on page 2).
Re:Well.... (Score:3, Informative)
Your sig caught my eye, and my brain translated it as NOP, NOP, NOP, NOP, INT 19. From what I remember, interrupt 19 is the disk I/O interrupt. Doesn't it just call the bootstrap loader on drive DL?
Re:Well.... [OT] (Score:4, Interesting)
So thats rougly:
Windows in 6 Bytes (IA-32): Do nothing then reboot.
Re:Well.... [OT] (Score:3, Funny)
Re:Well.... [OT] (Score:5, Funny)
Why shouldn't certification be free? (Score:5, Interesting)
Having an internet presence is critical to running a successful business venture. Also, the creation of a truly international digital economy necessitates the development of a trusted method of identity establishment. Especially in these days of questionable computer security and the impossibility of ascertaining identity from IP. Reliable certification is vital to the development of the internet economy.
However, the centralization of certification among a few organizations and their cost is shutting out smaller enterprises that don't have access to the fees or technology required. In effect, this institutes a kind of "information segregation" or isolationism that has the effect of a barrier to poorer nations - such as Nigeria or Rwanda - to the internet commerce that is so critical to the economy of the future.
As such, I believe the best scenario is free certification provided by ICANN that can certify pages from poorer nations, so they can compete on an even playing field with the wealthier nations. Giving out free certifications - one per IP address at least - is the best way to accomplish this, and will allow for confident and secure transmission of funds and information.
Re:Why shouldn't certification be free? (Score:5, Insightful)
2. Virtual hosts often share a single IP among many websites. You can't just authorize a name; SSL requires (from my understanding) a unique IP. That would make the IPv4 system even more strained.
3. Certification pricing is partly based on trust. Anyone can generate a free certificate. But it won't work with every system because it wasn't created by a "trusted provider."
If you can't afford a $200US/year fee for conducting "secure" business online, I probably wouldn't want to do business with you anyway.
Re:Why shouldn't certification be free? (Score:3, Informative)
$35/year, 99% installed browser base [fsnhosting.com]
Re:Why shouldn't certification be free? (Score:5, Informative)
Re:Why shouldn't certification be free? (Score:5, Informative)
This is the case if you want to use the default HTTPS port (443) since the hostname is encrypted. However, you can use your certificate on other ports. Just have your webserver listen to port 4443, and then in your links, just put https://yourhost.com:4443/ and it works great.
When I was running a small webhost business, instead of getting a new IP for each cert, I'd just put them on different ports.
Also, the IPv4 system isn't as strained as it used to be. With NAT, and creative netmasks, they have been able to spread out the IPs more efficiently. I wish it *were* more strained, because then they might be forced to actually switch over to IPv6.
Re:Why shouldn't certification be free? (Score:3, Insightful)
More to the point, the certificate exchange identifying the server happens before you ever get to send the HTTP headers. You can only serve one SSL certificate on each port.
The protocol could be extended to support this, e.g.:
Client: connect SSL
Server: hi, I'm www.site1.com
Client: OK, that cert checks out, but I wanted www.site2.com
Server: OK, here's the www.site2.com cert
Client: OK
but it doesn't currently.
Re:Why shouldn't certification be free? (Score:3, Informative)
Yes, and you also run into those of us who do heavy egress filtering.
Re:Why shouldn't certification be free? (Score:3, Interesting)
Re:Why shouldn't certification be free? (Score:4, Funny)
Re:Why shouldn't certification be free? (Score:3, Interesting)
Re:Why shouldn't certification be free? (Score:3, Interesting)
I would rather see encryption integrated into the DNS network. The root DNS servers are already trusted - their IP addresses are distributed with any DNS cache software. It wouldn't be too hard to also distribute their public key. Each DNS lookup could then request a signature as well as an address. Every time authority was delegated to another server, the SOA recor
Re:Why shouldn't certification be free? (Score:3, Interesting)
Re:Well.... (Score:5, Insightful)
I'm not sure what the point of this is, if the browsers don't have these folks listed as trusted authorities. You can already sign your own certificate and get the same effect. But if you are asking your customers/users to accept a certificate that is not signed by a trusted authority, you are leaving yourself open to being impersonated.
Re:Well.... (Score:3, Interesting)
Exactly.
I would only support a system that had many levels of validation.
1. You create an account and submit your site.
2. There would be a required waiting period of 30 days.
3. You would login to your account and request that your site be reviewed.
4. You must submit a deposit of $10 which will be returned when your site has been approved. If your site was not approved you must login to your account and request a refund.
5.
erg (Score:3, Insightful)
cacert.org (Score:5, Informative)
Re:cacert.org (Score:2, Informative)
For installing a cert on a Windows IIS server:
Find a recent copy of the makecert tool.
makecert -r -pe -n "CN=www.yourserver.com" -b 01/01/2000 -e 01/01/2036 -eku 1.3.6.1.5.5.7.3.1 -ss my -sr localMachine -sky exchange -sp "Microsoft RSA SChannel Cryptographic Provider" -sy 12
Then use the IIS management too
Re:cacert.org (Score:5, Informative)
(Hello Microsoft, We're a communist OpenSource project trying to educate netizens that they don't have to fork out gazzillions of dollars to big corporations use the Web. Would you mind helping us by including our root certificate with IE? Hello? Did we get cut off?)
Without that, the cert is not much better than a self-signed one.
Re:cacert.org (Score:3, Informative)
Let's see... With a CAcert certificate, a user only has to add a certificate to their browser once. With a self-signed certificate, they have to add it to their browser once for every single server, and once again every single time the server changes their certificate.
I'd say that pays off pretty quickly.
Re:but it prompts the user (Score:2)
If I'm just looking for an SSL-encrypted connection to an Open-source site which is signed by openca, I can deal with popups (or add the OpenCA cert to Firefox), assuming that I already trust the site.
If I'm buying something over the internet, I'm not so sure that I'd trust my credit card to some entity that was verified through OpenCA.
Re:but it prompts the user (Score:3, Interesting)
I think cacert has a very good program. You want a real cert then someone local has to verify your ID. It takes the money out and puts the trust back into SSL.
Secure certs are a ripoff (Score:2, Insightful)
And if you call now...... (Score:3, Insightful)
Re:And if you call now...... (Score:2)
Articles should have summaries in a manner that most respected news-sources use. Not like some used car salesman.
Say what?! You're new here, aren't you? ;) Slashdot's summaries are almost always deliberately inflammatory and lopsided (anti-DMCA, anti-Microsoft Borgification, pro-Everything For Free Foundation ;), and usually inaccurate. Google for 'site:slashdot.org RTFA!!!'; today's blurb about Australia's regulations on kiddie porn reporting is a perfect case in point. Nothing wrong with that, jus
Re:And if you call now...... (Score:2)
if you want to encourage people to write better summaries you should point them towards abstracts found in peer-reviewed academic journals.
Separate (Score:5, Interesting)
I've had a few situations where I wanted to encrypt html and had no need of guaranteeing my server's identity to anyone. It seems like I should be able to encrypt traffic without having to jump through hoops and spend a lot of cash. Or without having a second class certificate.
I hope this new project succeeds.
Re:Separate (Score:2)
You don't need to do anything special -- just set up SSL and issue yourself a certificate.
Any web browser will warn strongly that the certificate is not issued by a trusted organization, but you said you don't need to prove your identity, so this should perfectly suit your needs.
Re:Separate (Score:5, Informative)
You do realize that if you can't prove your identity, your clients are vulnerable to man-in-the-middle attacks, right? How's the browser to know if it's your server they're talking to, or to someone else who signed their own cert and is impersonating you (and proxying its transactions to you, logging or modifying them along the way)? Authority signed certificates give you this ability. Self-signed certificates do not provide complete transport-layer security.
This is not to say that the signing authority can't be free. It's about time someone did it.
Re:Separate (Score:3, Insightful)
If you are worried enough to want encryption, then you should be worried about man in the middle attacks. No point telling people their credit card details or email will be encrypted if it just gets sent to a random criminal who can read it, re-encrypt it and send it on to you.
If users can verify the identity of the far end point some other way, perhaps because they hav
So? (Score:5, Insightful)
Re:So? (Score:2, Informative)
locate and double-click SelfCert.exe (usually found in the C:\Program Files\Microsoft Office\Office10 folder).
Free.. Free.. FREE! (Score:5, Informative)
Re:Free.. Free.. FREE! (Score:3, Informative)
Text of linked article from ... linked article... (Score:5, Informative)
StartCom Free SSL Certificate Project
StartCom Free SSL Certificate Project The Idea:
Do you have a website or run even a web server and want to secure the traffic between your visitors browser and the web site? Did you find out, that in order to make your site SSL aware, you'll need a SSL (Secure Sockets Layer) certificate? Are you also surprised to find out that such a certificate can cost you up to a few hundred dollars, valid for one year only? For what, you might ask yourself?
StartCom Ltd., the vendor and distributor of StartCom Linux Operating Systems, operates also MediaHost(TM), a hosting company specialized in DB and Java web application hosting and offers its clients SSL secured web sites with certificates signed by StartCom Ltd already for years. Here is, where the idea for this project originated: Free SSL certificates!
How?
Most web servers, such as Apache, IIS and others are capable of running the 128-bit secured and encrypted SSL protocol. All you need, in most cases, is a SSL certificate to make it work. StartCom is going to provide you with this certificate through a simple web based interface wizard and sign up process free of charge. Together with the installation instructions, you'll have your secured web site running within a few minutes.
Why?
Because we believe, that companies like Verisign, Thawte and others, just rip you off your money! Simply as that! Even the so called "Free SSL certificates" offered by some companies aren't free, but can cost you up to a US $ 100 or even more.
More than that, lets think about, what SSL is supposed to do: Encrypt and secure the traffic between a browser and the server! Point! It is not supposed to give you the impression, that a website is trustworthy or even say anything about its identity...for this you should use your brain and common sence.* Anybody can get a SSL certificate and as such does not give any type of warranty about the intensions, or quality of products, of the website or its owners! We'll prove here, that SSL certificates can cost much less or may be even free of charge! If enough people are using our certificates and stop buying them, well, than the existence of these companies will vanish and we'll all win another piece of freedom!
* We'll offer in the future, some sort of verified SSL certificates, but on this later...
Where, when?
Convinced? We build and tested this web site during February 2005, so you'll be able to get a SSL certificate for free. Use the links below to get your free certificate now! Please spread the word about this project to your friends (by having a link to our web site?). Contact us, if you want to contribute. And....spend your money on better things! There are enough good causes to support!
The clickable link: (Score:2)
The problem with free SSL certs... (Score:5, Insightful)
Common sense says, make sure the StartCom CA Certificate is not on any of my machines!
The entire point of using certificates is so that you know that there is a certified binding between a public key and an identity. If you don't know who will recieve your encrypted information then there's no point encrypting it in the first place!
How do you figure? (Score:2)
Re:The problem with all SSL certs... (Score:5, Informative)
For a (partial) list of the design and implementation problems that interfere with certificates actually solving the problem, check out Peter Gutman's scathing critique of X.509-based PKI [auckland.ac.nz].
comodo.com (Score:5, Informative)
If not, here is a recipe for free signed certificates:
openssl genrsa -des3 -out server.key 1024
openssl req -new -key server.key -out server.csr
openssl genrsa -des3 -out ca.key 1024
openssl req -new -x509 -days 365 -key ca.key -out ca.crt
Self signing (Score:2, Informative)
you can do it yourself if you want, but the user will be prompted with a scary dialog because your self-signed cert doesnt come built into the browser
for encryption this doesnt matter but on an ecommerce site transparent http>https is essential, if a user becomes accustomed to warning dialogs they will learn to ignore them (witness activeX spyware installs)
so signing certs is easy, signing non-prompting certs is why people pay the money
Most tutorials with apache + mod_ssl have had this (Score:3, Insightful)
In fact, even mod_ssl has information on how to do so on the site:
http://www.modssl.org/docs/2.6/ssl_faq.html#ToC27 [modssl.org]
Mr. Anderson, what good is an SSL certificate if . (Score:2)
Want to run a website with secure connections? Or, want to run a website at all? Then don't publicise it on
I sometimes worry about these free services. (Score:3, Interesting)
That is not to say that the particular people in the article are crooked -- I'm sure they're on the level. I'm just saying that as this kind of thing becomes popular, you can be sure some computer hackers out there will try to co-opt the good name of services like these so they can give out compromised certificates and steal information from you and your customers.
The bottom line is: When it's free, you just never know. A thousand eyes only get you so far. This is why I tend to stick to software backed by a solid corporate history on my own production servers. It's just not worth the risk to skimp on costs when the fact is your entire business is on the line there.
You just have to know who you're dealing with when you get into this kind of thing. Are you dealing with someone honest or are you dealing with some sort of shady basement operation that moved to Canada to avoid cryptography laws? When mission critical information is at stake, this stuff counts.
Woweee (Score:5, Informative)
When you finally get to the site that is offering the certs (http://cert.startcom.org/ [startcom.org]) all you find is bad grammar and certs that aren't recognized by any browser (i.e. warnings pop up). It's admirable that the site wants to issue free certificates, but you won't find many surfers willing to trust them. Also, you can create your own certs with minimal effort, and you'll end up with the same thing.
Re:Woweee (Score:2, Insightful)
Why not just... (Score:3, Interesting)
Re:Why not just... (Score:3, Insightful)
Let the government issue crypto certificates, I say.
For what, you might ask yourself? (Score:2)
I ask myself: "How did I get here?" And then I ask myself: "Where is that beautiful house? Where is that beautiful wife?"
Ummmm... Why??? (Score:4, Informative)
Additionally, with cacert.org, you are able to get more than just server certs and keys.
SSL Certificates (Score:2)
Re:SSL Certificates (Score:2)
If it's ShadyCorp Domains in the bahamas, then does not matter whether their cert is from an authority or not.
Likewise if it's "Tom Trusted" in This Town and You're at tomtrusted.com, then I gather the certificate is up to snuff.
WTF?? (Score:3)
WTF is "SSL aware"?
I have had no problem creating and using self signed certs with SSL.
This is just plain stupid (Score:4, Insightful)
Without identity verification there is NO POINT in encryption for most usages.
The point is to make the person who is submitting their credit card number resonably secure in the knowledge that they are sending it to who they think they are. This cannot happen without identity verification.
Blatant ignorance (Score:5, Interesting)
Re:Man in the Middle Attack only works first time (Score:3, Insightful)
If the CA is just signing everyth
breaking the monopoly on certs (Score:4, Informative)
I've also seen a lots of posts from people saying that you can generate a self-signed cert for free. The problem with these self-signed certs is that you get a pop-up from your browser warning you that the cert isn't trusted.
It appears to me that cert.startcom.org [startcom.org] is trying to do something different: They are handing out certs with them as the root authority and giving information about how to install their cert as acceptable by your browser. If enough people do this, then major browsers will "have" to start including startcom.org's certs in their distributions. Until that happens, you still get a reduced number of cert pop-ups because many different websites will be using the same "non standard" cert authority.
You will get all the cheapness of self-signed certs with all the security of a cert from verislime or thawte. After all, the only real security with regular certs is that the traffic between your broswer and the website is encryptied.
Re:breaking the monopoly on certs (Score:3, Insightful)
It's about trust (Score:4, Informative)
Re:It's about trust (Score:4, Interesting)
Unless you work there, Verisign is just a faceless enigma. You know more about your father's brother's nephew's cousin's former roommate, than you know about Verisign.
If a cert is signed only by Verisign (and the nature of X.509 certs is that they only have one CA) then you have to decide to either trust it completely, or trust it not at all. And if, like 99.999999% of the population, you simply have no clue as to whether or not Verisign can be trusted, best practices are to assume the worst, and the certs are effectively meaningless, whether they are signed by Verisign or by some kid in his basement.
As it turns out, there's a better way: PGP. PGP uids can be signed by multiple entities, so if you have a clue about some signers and no clue about others, you can throw out the info that means nothing to you, and still take advantage of the info which has meaning. And even for the signatures that you're uncertain about, if you're willing to quantify how uncertain you are, then you can multiply uncertainties, based on the idea that conspiracies are hard to pull off.
The only problem with PGP, is that use of it in concert with secure connections, hasn't really caught on. But surprisingly, the idea isn't unheard of or completely dead, either. If people ever start to take internet security really seriously, there are projects like GnuTLS [gnu.org]. It's a long way off from the mainstream, but just about everything we take for granted these days, was like that at one time. :-)
Re:It's about trust (Score:3, Interesting)
Re:It's about trust (Score:5, Interesting)
CA's are supposed to make their issuing policies publically available. One day a few years ago when I had too much time on my hands I went through and checked them all. Of the 100 odd root certificates that were originally installed in my browser, I threw out about half for not having their policy publically available in human readable form. I threw out most of the rest (including Verisign and Thawte's low-end certs) because their policy was too lax, but maybe I just have high standards.
DomainKeys (Score:5, Interesting)
You post your public key in your DNS record. DNS already maintains an identity system.
The trick with DK is to get the browser's to fetch the site's public key from the DNS record (it has to do the DNS query anyway) and use that in the handshaking.
Yes, there is the potential for someone to hijack the site, but that is getting more difficult. And, DK would be a free add-on to the DNS stuff you have to do anyway.
GoDaddy will give you a *real* free SSL cert... (Score:5, Informative)
https://www.godaddy.com/gdshop/ssl/ssl_
Not to mention, it's the cheapest SSL cert I know of at $30/year.
Do we really want free SSL certificates? (Score:3, Insightful)
Yes, it's possible to freely self-sign certificates to get encryption. I run my own certificate authority for encrypting traffic among my clients, if they aren't conducting e-commerce. These self-signed certificates work fine without triggering a browser warning--if you import the certificate authority certificate.
For my public/e-commerce sites, I use FreeSSL, at $35/year. This buys me a blessing from a CA that is pre-installed in over 95% of all browsers in use. What's not covered? Konqueror. Curl. I think Safari, though I haven't checked recently. For my clients who want those to work, I suggest spending the ~$120 or so for a Geotrust cert.
Now, imagine if every spammer in the world could get an SSL certificate for free... Already domains are cheap enough that they can set them up to easily spoof real web sites--banks, etc. Imagine if every one of those had an SSL certificate, and didn't trigger a browser warning? Most people I know look for the lock. If the lock is there, they trust the site. They don't actually look at the certificate, or even the URL much.
For this reason alone, I'm glad certs aren't free. You can do encryption for free, but I'd prefer my browser to at least let me know the site I'm visiting is too cheap to buy a real cert. (that's not meant as a slam, since I'm too cheap to buy one for most of my sites...).
Cheers,
Freelock Computing [freelock.com]
SSL Certificates can be had quite a bit cheaper (Score:4, Informative)
As much as I'd love to say otherwise, the SSL business is actually quite competitive these days -- the days of a 128-bit certificate costing at least $895 are long gone.
The Meaning Of All This For Mere Mortals... (Score:5, Informative)
First of all, there are two things, at the minimum, you need to talk to stocks-r-us over the internet securely from a coffee shop:
1. An encrypted communication channel (this is handled by public key and symmetric key encryption protocols)
2. A guarantee that the person you are talking to over the 'net really is stocks-r-us and not an impostor.
All this fancy talk in this slashdot story involves this second step in this process... so how can you get this no-impostor guarantee? Well, the most basic way would be to ask stocks-r-us a secret question only they could answer, sort of like a "secret handshake". An SSL certificate is simply a "secret handshake". (well, not so simply, but just accept this idea for now...) So in order to make sure the company you're talking to over the 'net is your stocks-r-us, you check to see if they know the stocks-r-us secret handshake. Problem solved...
This is where a certificate authority comes in: You can get a third person (whose handshake you do know) to give you stocks-r-us' secret handshake. There are many many organizations that offer free (or not free) services to act as this third person (i.e. as a "CA") So stocks-r-us can just sign up with one of these companies to give them the secret handshake info- Problem solved...
Well, the answer is pretty goofy... the "handshake" of the CA has to be "hardwired" into every copy of Firefox/Internetexplorer/Safari/etc when it is installed. If you go to the settings of your browser, you'll see a list of CAs already placed in by Microsoft/Apple/Mozilla/etc right out of the box! That's the only way this could work...
...so you might be wondering: Don't the CA companies in this initial list of built-in handshakes have some kind of monopoly/oligopoly? The answer, of course, is YES: These special CAs charge monopoly-style prices for their services for this very reason. The point of this slashdot article is that an non-profit group wants to somehow make Microsoft/Apple/Mozilla/etc to put it in this super-duper "handshake" list, but it promises it won't charge everyone big bucks who wants to use them as their third party.
(I'm no expert on this, so any experts are welcome to reply to my post to make any corrections if there are any errors of substance...)
Re:The Meaning Of All This For Mere Mortals... (Score:3, Funny)
Certificate generation (Score:3, Interesting)
How do I know that they don't keep a copy of the cert for their own use? They could impersonate my server any time with this.
What nobody realizes is this (Score:3, Insightful)
Re:SSL doesn't have to be expensive (Score:2)
Re:If you want a "real" one (Score:5, Informative)
Re:If you want a "real" one (Score:4, Insightful)
Re:Price on certs are for the reason ... (Score:3, Interesting)
Re:nice ... but to be useful (Score:3, Insightful)
Re:I Need Help with Free SSL Cert -- (Score:3, Informative)
You need a dedicated server with a separate IP address to realistically use SSL.
Why? With shared hosting, the virtual host is selected based on the Host: header of the HTTP request. But the request is sent over the SSL connection!
So the sequence is:
1. establish secure connection based on certificate (which is attached to sitename)
2. send request over secure connection
But in shared hosting the situation is:
1. connect to shared host
2. decide which site to serve based
Re:Yes, but is their root known? (Score:4, Informative)
Also, they don't seem to permit you to provide your own CSR, which as someone else noted somewhat vaguley, is a MAJOR security problem. A cert signer should *never* have access to your private key - you make the key on your system, use it to make a CSR, then they sign the CSR. The resulting signed cert is only then usable if you have both it and the private key.