As I mentioned previously, I was mistaken in that I had made a "SSL Email" cert request from a free-email address. Much to my chagrin, I am now the technical contact on some "SSL Server" requests, and I can tell everyone here, first hand, that it is amazing how thorough you guys are in verifying identity. It's a good thing though, but, a lot of paperwork. I have a much better understanding of how the certification process works. This list has been more informative than any document I've read. Thanks to all.
-Damian ----- Original Message ----- From: "Trilli, Kevin" < > To: <[EMAIL PROTECTED]> Sent: Tuesday, March 05, 2002 12:33 PM Subject: RE: OpenSSL Chain Of Trust > Just to add one final data point to close this issue, since my private > response was posted to the list. > > Damian, > > VeriSign has received two *SSL Server* cert requests from you as the > technical contact, both of which you revoked either before authentication or > after we completed authentication successfully. > > Neither of these were from a known freemail address, as, again, that is > against our policy. > > I am happy to answer any of your questions concerning our authentication > processes, or help you with anything else concerning VeriSign certs. Please > contact me off-line if I can help. > > Thanks, sorry for the interruption everyone. > Kevin > > > -----Original Message----- > From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED]] > Sent: Monday, March 04, 2002 2:15 PM > To: [EMAIL PROTECTED] > Subject: Re: OpenSSL Chain Of Trust > > > Woops. You are correct. I just checked, and indeed the certification part > is quite different for Server ID's. I was under the assumption that there > was not significant differences between certificates. Definitely extensive. > Thanks though for the answers regarding the Chain of Trust establishment. > ----- Original Message ----- > From: "Andrew T. Finnell" <[EMAIL PROTECTED]> > To: <[EMAIL PROTECTED]> > Sent: Saturday, March 02, 2002 3:09 PM > Subject: RE: OpenSSL Chain Of Trust > > > > From what I can see you bought an email certificate from > > Verisign. Not a certificate for web servers. They do extensive > > background checks before giving you a certificate that will work on a > > server. If this is the case you will not be able to use the certificate > > you obtained from Verisign for your website. You need to purchase the > > certificate for web servers not your email address. > > > > - > > Andrew T. Finnell > > Active Solutions L.L.C > > [EMAIL PROTECTED] > > > > > -----Original Message----- > > > From: [EMAIL PROTECTED] > > > [mailto:[EMAIL PROTECTED]] On Behalf Of Gregory Stark > > > Sent: Saturday, March 02, 2002 2:21 PM > > > To: [EMAIL PROTECTED] > > > Subject: Re: OpenSSL Chain Of Trust > > > > > > > > > Amazing. Are you serious? What is the issuer Name in your > > > certificate? I'd like to believe VeriSign did more than just > > > identify your cash. > > > > > > ====================== > > > Greg Stark > > > [EMAIL PROTECTED] > > > ====================== > > > > > > > > > ----- Original Message ----- > > > From: <[EMAIL PROTECTED]> > > > To: <[EMAIL PROTECTED]> > > > Sent: Thursday, February 28, 2002 5:16 PM > > > Subject: OpenSSL Chain Of Trust > > > > > > > > > > I'm rather new to the SSL world, but I have a simple issue. I paid > > > > big > > > $$$ > > > > to Verisign for a Certificate for my web server. It seems > > > to me that > > > > the only reason I had to pay big $$$ is because Microsoft lists > > > > Verisign as a Trusted CA. Of course, the reason for this is so > > > > Verisign can "Identify" who I am, which I must say, is not > > > > verification. They took my Hotmail Email > > > Address, > > > > and a > > > > Wire Transfer from Western Union. I never had to provide > > > my identity. > > > > > > > > Can I do the following? > > > > > > > > Issue an openSSL certificate to another server, from the > > > server where > > > > I installed the expensive Verisign certificate? > > > > > > > > My hope is that the certificate I issue will establish a chain of > > > > trust > > > back > > > > to verisign, thus, users won't get that silly popup window in their > > > browsers > > > > saying the site is dangerous, etc etc. I don't think my > > > certificate > > > > is dangerous just because I have not paid Microsoft massive > > > amounts of > > > > money > > > to > > > > consider me a CA. Is their any way to do this? Thanks. > > > > > > > > > > > > > > > ______________________________________________________________________ > > > > OpenSSL Project > > > http://www.openssl.org > > > > User Support Mailing List > > > [EMAIL PROTECTED] > > > > Automated List Manager > > > [EMAIL PROTECTED] > > > > > > > > > > ______________________________________________________________________ > > > OpenSSL Project http://www.openssl.org > > > User Support Mailing List [EMAIL PROTECTED] > > > Automated List Manager [EMAIL PROTECTED] > > > > > > > > > ______________________________________________________________________ > > OpenSSL Project http://www.openssl.org > > User Support Mailing List [EMAIL PROTECTED] > > Automated List Manager [EMAIL PROTECTED] > > > > ______________________________________________________________________ > OpenSSL Project http://www.openssl.org > User Support Mailing List [EMAIL PROTECTED] > Automated List Manager [EMAIL PROTECTED] > ______________________________________________________________________ > OpenSSL Project http://www.openssl.org > User Support Mailing List [EMAIL PROTECTED] > Automated List Manager [EMAIL PROTECTED] > ______________________________________________________________________ OpenSSL Project http://www.openssl.org User Support Mailing List [EMAIL PROTECTED] Automated List Manager [EMAIL PROTECTED]