[sldev] llHTTPRequest and SSL root CAs

Kamilion kamilion at gmail.com
Sun Aug 12 05:08:00 PDT 2007


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

I've been messing around with llHTTPRequest and SSL recently, and I
had a couple questions about it.

HTTP_VERIFY_CERT is mentioned in the wiki:
If TRUE, the server SSL certificate must be verifiable using one of
the standard certificate authorities when making HTTPS requests. If
FALSE, any server SSL certificate will be accepted.


So, exactly what CAs are considered standard?

I'm currently using free SSL server certificates from:
https://cert.startcom.org/index.php
https://cert.startcom.org/?app=110#auth

Is StartCom's CA considered standard? It's available in Firefox,
Safari and Konqueror by default.

What about CACert?
http://www.cacert.org/

AFAIK it's not available in firefox yet, but it's supposedly pending:
https://bugzilla.mozilla.org/show_bug.cgi?id=215243
"Marking as VERIFIED, with the understanding that we (CAcert, I'm a CAcert, Inc.
member) will open a new bug when the audit is done." -- Nicholas E.
Bebout   2007-04-27 11:40:22 PDT


If possible, could we get a list of accepted CAs?
I'd rather not have to pay to get a SSL certificate simply for
encrypting my traffic, but if I must, I suppose I'll have to deal with
godaddy as much as I dislike some of their practices (
http://www.nodaddy.com ).

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.7 (MingW32)
Comment: http://firegpg.tuxfamily.org

iD8DBQFGvvgJ+Hm92PVlrtQRAv7IAKCOBTeV3MrLR+JPlp1E6yixkd+41ACfYm3i
5/0y6wQnKz5cdeVrH73ENzU=
=2Qkl
-----END PGP SIGNATURE-----


More information about the SLDev mailing list