As I mentioned previously, I was mistaken in that I had made a "SSL Email"
cert request from a free-email address.  Much to my chagrin, I am now the
technical contact on some "SSL Server" requests, and I can tell everyone
here, first hand, that it is amazing how thorough you guys are in verifying
identity.  It's a good thing though, but, a lot of paperwork.  I have a much
better understanding of how the certification process works.  This list has
been more informative than any document I've read.  Thanks to all.

-Damian

----- Original Message -----
From: "Trilli, Kevin" <    >
To: <[EMAIL PROTECTED]>
Sent: Tuesday, March 05, 2002 12:33 PM
Subject: RE: OpenSSL Chain Of Trust


> Just to add one final data point to close this issue, since my private
> response was posted to the list.
>
> Damian,
>
> VeriSign has received two *SSL Server* cert requests from you as the
> technical contact, both of which you revoked either before authentication
or
> after we completed authentication successfully.
>
> Neither of these were from a known freemail address, as, again, that is
> against our policy.
>
> I am happy to answer any of your questions concerning our authentication
> processes, or help you with anything else concerning VeriSign certs.
Please
> contact me off-line if I can help.
>
> Thanks, sorry for the interruption everyone.
> Kevin
>
>
> -----Original Message-----
> From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED]]
> Sent: Monday, March 04, 2002 2:15 PM
> To: [EMAIL PROTECTED]
> Subject: Re: OpenSSL Chain Of Trust
>
>
> Woops.  You are correct. I just checked, and indeed the certification part
> is quite different for Server ID's.  I was under the assumption that there
> was not significant differences between certificates.  Definitely
extensive.
> Thanks though for the answers regarding the Chain of Trust establishment.
> ----- Original Message -----
> From: "Andrew T. Finnell" <[EMAIL PROTECTED]>
> To: <[EMAIL PROTECTED]>
> Sent: Saturday, March 02, 2002 3:09 PM
> Subject: RE: OpenSSL Chain Of Trust
>
>
> > From what I can see you bought an email certificate from
> > Verisign. Not a certificate for web servers. They do extensive
> > background checks before giving you a certificate that will work on a
> > server. If this is the case you will not be able to use the certificate
> > you obtained from Verisign for your website. You need to purchase the
> > certificate for web servers not your email address.
> >
> > -
> > Andrew T. Finnell
> > Active Solutions L.L.C
> > [EMAIL PROTECTED]
> >
> > > -----Original Message-----
> > > From: [EMAIL PROTECTED]
> > > [mailto:[EMAIL PROTECTED]] On Behalf Of Gregory Stark
> > > Sent: Saturday, March 02, 2002 2:21 PM
> > > To: [EMAIL PROTECTED]
> > > Subject: Re: OpenSSL Chain Of Trust
> > >
> > >
> > > Amazing. Are you serious? What is the issuer Name in your
> > > certificate? I'd like to believe VeriSign did more than just
> > > identify your cash.
> > >
> > > ======================
> > > Greg Stark
> > > [EMAIL PROTECTED]
> > > ======================
> > >
> > >
> > > ----- Original Message -----
> > > From: <[EMAIL PROTECTED]>
> > > To: <[EMAIL PROTECTED]>
> > > Sent: Thursday, February 28, 2002 5:16 PM
> > > Subject: OpenSSL Chain Of Trust
> > >
> > >
> > > > I'm rather new to the SSL world, but I have a simple issue.  I paid
> > > > big
> > > $$$
> > > > to Verisign for a Certificate for my web server.  It seems
> > > to me that
> > > > the only reason I had to pay big $$$ is because Microsoft lists
> > > > Verisign as a Trusted CA.  Of course, the reason for this is so
> > > > Verisign can "Identify" who I am, which I must say, is not
> > > > verification.  They took my Hotmail Email
> > > Address,
> > > > and a
> > > > Wire Transfer from Western Union.  I never had to provide
> > > my identity.
> > > >
> > > > Can I do the following?
> > > >
> > > > Issue an openSSL certificate to another server, from the
> > > server where
> > > > I installed the expensive Verisign certificate?
> > > >
> > > > My hope is that the certificate I issue will establish a chain of
> > > > trust
> > > back
> > > > to verisign, thus, users won't get that silly popup window in their
> > > browsers
> > > > saying the site is dangerous, etc etc.  I don't think my
> > > certificate
> > > > is dangerous just because I have not paid Microsoft massive
> > > amounts of
> > > > money
> > > to
> > > > consider me a CA.  Is their any way to do this?  Thanks.
> > > >
> > > >
> > > >
> > > ______________________________________________________________________
> > > > OpenSSL Project
> > > http://www.openssl.org
> > > > User Support Mailing List
> > >         [EMAIL PROTECTED]
> > > > Automated List Manager
> > > [EMAIL PROTECTED]
> > > >
> > >
> > > ______________________________________________________________________
> > > OpenSSL Project                                 http://www.openssl.org
> > > User Support Mailing List                    [EMAIL PROTECTED]
> > > Automated List Manager                           [EMAIL PROTECTED]
> > >
> >
> >
> > ______________________________________________________________________
> > OpenSSL Project                                 http://www.openssl.org
> > User Support Mailing List                    [EMAIL PROTECTED]
> > Automated List Manager                           [EMAIL PROTECTED]
> >
>
> ______________________________________________________________________
> OpenSSL Project                                 http://www.openssl.org
> User Support Mailing List                    [EMAIL PROTECTED]
> Automated List Manager                           [EMAIL PROTECTED]
> ______________________________________________________________________
> OpenSSL Project                                 http://www.openssl.org
> User Support Mailing List                    [EMAIL PROTECTED]
> Automated List Manager                           [EMAIL PROTECTED]
>

______________________________________________________________________
OpenSSL Project                                 http://www.openssl.org
User Support Mailing List                    [EMAIL PROTECTED]
Automated List Manager                           [EMAIL PROTECTED]

Reply via email to