[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]

Re: [tor-relays] Watching the attacks on my relay



On Fri, 08 Nov 2013 20:15:51 +0100
elrippo <elrippo@xxxxxxxxxxxxxxxxx> allegedly wrote:

> Jope. I tend to have some issues with some CA's.
> But yes you are right, i should get me a decent certificate.
> I will do that, promise.
> 
> You self signed your site certificate...? 
> 
> 
> 
I don't see any problem per se with a self-signed certificate on a site
which does not purport to protect anything sensitive (such as financial
transactions). The problem with this particular certificate is that
the common name identifier is both wrong (www) and badly formattted
(http://) But both of those errors can be corrected very quickly.

Why pay a CA if you don't trust the CA model?

Mick 

---------------------------------------------------------------------

 Mick Morgan
 gpg fingerprint: FC23 3338 F664 5E66 876B  72C0 0A1F E60B 5BAD D312
 http://baldric.net

---------------------------------------------------------------------

Attachment: signature.asc
Description: PGP signature

_______________________________________________
tor-relays mailing list
tor-relays@xxxxxxxxxxxxxxxxxxxx
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays