[sldev] llHTTPRequest and SSL root CAs
Kamilion
kamilion at gmail.com
Sun Aug 12 05:08:00 PDT 2007
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
I've been messing around with llHTTPRequest and SSL recently, and I
had a couple questions about it.
HTTP_VERIFY_CERT is mentioned in the wiki:
If TRUE, the server SSL certificate must be verifiable using one of
the standard certificate authorities when making HTTPS requests. If
FALSE, any server SSL certificate will be accepted.
So, exactly what CAs are considered standard?
I'm currently using free SSL server certificates from:
https://cert.startcom.org/index.php
https://cert.startcom.org/?app=110#auth
Is StartCom's CA considered standard? It's available in Firefox,
Safari and Konqueror by default.
What about CACert?
http://www.cacert.org/
AFAIK it's not available in firefox yet, but it's supposedly pending:
https://bugzilla.mozilla.org/show_bug.cgi?id=215243
"Marking as VERIFIED, with the understanding that we (CAcert, I'm a CAcert, Inc.
member) will open a new bug when the audit is done." -- Nicholas E.
Bebout 2007-04-27 11:40:22 PDT
If possible, could we get a list of accepted CAs?
I'd rather not have to pay to get a SSL certificate simply for
encrypting my traffic, but if I must, I suppose I'll have to deal with
godaddy as much as I dislike some of their practices (
http://www.nodaddy.com ).
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.7 (MingW32)
Comment: http://firegpg.tuxfamily.org
iD8DBQFGvvgJ+Hm92PVlrtQRAv7IAKCOBTeV3MrLR+JPlp1E6yixkd+41ACfYm3i
5/0y6wQnKz5cdeVrH73ENzU=
=2Qkl
-----END PGP SIGNATURE-----
More information about the SLDev
mailing list