Subject: CAcert Code Development list.
List archive
- From: "Jason Curl" <jcurl AT arcor.de>
- To: 'Bernhard Fröhlich' <bernhard AT cacert.org>
- Cc: "'CAcert Code Development list.'" <cacert-devel AT lists.cacert.org>
- Subject: RE: Automating Certificate Renewal
- Date: Tue, 27 Sep 2011 21:10:38 +0200
|
Hi Bernhard, Dropping the support list. I had a quick look and it looks a little lacking. Is providing the password in the URL really secure? I don’t know quite enough about SSL to know if the URL is secure – I assume it isn’t. I can speak to a colleague of mine at work (he’s working on wdye.osm-tools.org), and he should have a couple of good ideas (he’s also a CAcert member). Hopefully he could give some tips on a useful API. But I’m no web programmer, just embedded and some moderate stuff on Windows. To emulate completely the certificate generation, as well as the renewal. Also, I’m confused by the discussion that the private key is required by CAcert. I disagree with this and would expect that CAcert only requires signing of the public key (if the pub key doesn’t match with the private key, then the certificate is useless), or what is your opinion. I really do not want to submit the private key at all, else everything can be handled by the backend. Thanks & Best Regards, Jason. From: Bernhard Fröhlich [mailto:bernhard AT cacert.org] Hi Jason, |
Attachment:
smime.p7s
Description: S/MIME cryptographic signature
- Re: Automating Certificate Renewal, Bernhard Fröhlich, 09/26/2011
- RE: Automating Certificate Renewal, Jason Curl, 09/27/2011
- Re: Automating Certificate Renewal, Bernhard Fröhlich, 09/27/2011
- RE: Automating Certificate Renewal, Jason Curl, 09/27/2011
Archive powered by MHonArc 2.6.16.