Hi,

I'm working on an embedded device that makes heavy use of SSL. The
primary use of SSL is for authentication, users need to make sure that
they are talking to the correct device. As a result, each device has a
few SSL certificates that are created, signed and written to the
device during manufacturing.

With the certificates being signed in the factory, the common name for
the https certificate is just '<product name> <serial number> HTTPS'.
However, doing this results in a 'Domain Name Mismatch' with firefox
and a rather scary (for users) looking warning with the words "We
recommend that you close this webpage and do not continue to this
website" from IE7.

So I need to do something to make the web browser happy, because right
now it really confuses people. I was wondering what is the proper way
to deal with this issue?

A few of the embedded devices that I've played around with all seem to
be using self signed https certificates. This won't work for our
application, because non-browser software that uses the https
interface wants to be able to authenticate that it is talking to the
correct device, so the https cert needs to have trust back to our root
cert. Right now, I'm leaning towards having a per device certificate
that is signed by our CA and then at runtime re-sign the https
certificate, using the per device certificate, with the updated
subject line. It seems silly that the browser is putting so much trust
into DNS or an IP address. I'm hoping someone knows of a better
solution to this problem.

Also, do common web browsers support multiple having multiple possible
common name entries in a subject? Most of the devices won't have DNS
names, but in the rare case that they do, I'd like to have the browser
not complain about using either the IP or the common name.

                        Thanks,
                        Clem
______________________________________________________________________
OpenSSL Project                                 http://www.openssl.org
User Support Mailing List                    openssl-users@openssl.org
Automated List Manager                           [EMAIL PROTECTED]

Reply via email to