Re: [CODE4LIB] ipsCA Certs

2010-01-04 Thread Jonathan Rochkind
Yes, you are right. I'm afraid we are using ipsCA certs, and using the 
'updated' certs (that is, those that have not expired) are still not 
trusted by Firefox. Or Opera or Safari.  They are trusted by IE7. 
Haven't tested IE6.


Godmar Back wrote:

Hi,

in my role as unpaid tech advisor for our local library, may I ask a
question about the ipsCA issue?

Is my understanding correct that ipsCA currently reissues certificates [1]
signed with a root CA that is not yet in Mozilla products, due to IPS's
delaying the necessary vetting process [2]? In other words, Mozilla users
would see security warnings even if a reissued certificate was used?

The reason I'm confused is that I, like David, saw a number of still valid
certificates from "IPS Internet publishing Services s.l." already shipping
with Firefox, alongside the now-expired certificate. But I suppose those
certificates are for something else and the reissued certificates won't be
signed using them?

Thanks,

 - Godmar

[2] https://bugzilla.mozilla.org/show_bug.cgi?id=529286
[1] http://certs.ipsca.com/Support/hierarchy-ipsca.asp

On Thu, Dec 17, 2009 at 4:02 PM, John Wynstra  wrote:

  

Out of curiosity, did anyone else using ipsCA certs receive notification
that due to the coming expiration of their root CA (December 29,2009), they
would need a reissued cert under a new root CA?

I am uncertain as to how this new Root CA will become a part of the
browsers trusted roots without some type of user action including a software
upgrade, but the following library website instructions lead me to believe
that this is not going to be smooth.  http://bit.ly/53Npel

We are just about to go live with EZProxy in January with an ipsCA cert
issued a few months ago, and I am not about to do that if I have serious
browser support issue.


--
<><><><><><><><><><><><><><><><><><><>
John Wynstra
Library Information Systems Specialist
Rod Library
University of Northern Iowa
Cedar Falls, IA  50613
wyns...@uni.edu
(319)273-6399
<><><><><><><><><><><><><><><><><><><>




  


Re: [CODE4LIB] ipsCA Certs

2010-01-04 Thread Richmond,Ian
I think you are correct.  I and another library went and got a re-issued cert 
from ipsCA, stuck it in ezproxy, and found that Firefox as well as opera gave a 
security warning. (Actually, Opera never did work with the old ipsCA cert 
either.)  

There is also correspondence between Mozilla and ipsCA, culminating in a note 
that Mozilla won't be activating the ipsCA cert, since they are past the 
deadline.

I was interested from the language that there seemed to be a way of activating 
certs rather than just putting them in there; perhaps you are seeing "inactive" 
certs from ipsCA?

-Original Message-
From: Code for Libraries [mailto:code4...@listserv.nd.edu] On Behalf Of Godmar 
Back
Sent: Monday, January 04, 2010 2:52 PM
To: CODE4LIB@LISTSERV.ND.EDU
Subject: Re: [CODE4LIB] ipsCA Certs

Hi,

in my role as unpaid tech advisor for our local library, may I ask a
question about the ipsCA issue?

Is my understanding correct that ipsCA currently reissues certificates [1]
signed with a root CA that is not yet in Mozilla products, due to IPS's
delaying the necessary vetting process [2]? In other words, Mozilla users
would see security warnings even if a reissued certificate was used?

The reason I'm confused is that I, like David, saw a number of still valid
certificates from "IPS Internet publishing Services s.l." already shipping
with Firefox, alongside the now-expired certificate. But I suppose those
certificates are for something else and the reissued certificates won't be
signed using them?

Thanks,

 - Godmar

[2] https://bugzilla.mozilla.org/show_bug.cgi?id=529286
[1] http://certs.ipsca.com/Support/hierarchy-ipsca.asp

On Thu, Dec 17, 2009 at 4:02 PM, John Wynstra  wrote:

> Out of curiosity, did anyone else using ipsCA certs receive notification
> that due to the coming expiration of their root CA (December 29,2009), they
> would need a reissued cert under a new root CA?
>
> I am uncertain as to how this new Root CA will become a part of the
> browsers trusted roots without some type of user action including a software
> upgrade, but the following library website instructions lead me to believe
> that this is not going to be smooth.  http://bit.ly/53Npel
>
> We are just about to go live with EZProxy in January with an ipsCA cert
> issued a few months ago, and I am not about to do that if I have serious
> browser support issue.
>
>
> --
> <><><><><><><><><><><><><><><><><><><>
> John Wynstra
> Library Information Systems Specialist
> Rod Library
> University of Northern Iowa
> Cedar Falls, IA  50613
> wyns...@uni.edu
> (319)273-6399
> <><><><><><><><><><><><><><><><><><><>
>


Re: [CODE4LIB] ipsCA Certs

2010-01-04 Thread Godmar Back
Hi,

in my role as unpaid tech advisor for our local library, may I ask a
question about the ipsCA issue?

Is my understanding correct that ipsCA currently reissues certificates [1]
signed with a root CA that is not yet in Mozilla products, due to IPS's
delaying the necessary vetting process [2]? In other words, Mozilla users
would see security warnings even if a reissued certificate was used?

The reason I'm confused is that I, like David, saw a number of still valid
certificates from "IPS Internet publishing Services s.l." already shipping
with Firefox, alongside the now-expired certificate. But I suppose those
certificates are for something else and the reissued certificates won't be
signed using them?

Thanks,

 - Godmar

[2] https://bugzilla.mozilla.org/show_bug.cgi?id=529286
[1] http://certs.ipsca.com/Support/hierarchy-ipsca.asp

On Thu, Dec 17, 2009 at 4:02 PM, John Wynstra  wrote:

> Out of curiosity, did anyone else using ipsCA certs receive notification
> that due to the coming expiration of their root CA (December 29,2009), they
> would need a reissued cert under a new root CA?
>
> I am uncertain as to how this new Root CA will become a part of the
> browsers trusted roots without some type of user action including a software
> upgrade, but the following library website instructions lead me to believe
> that this is not going to be smooth.  http://bit.ly/53Npel
>
> We are just about to go live with EZProxy in January with an ipsCA cert
> issued a few months ago, and I am not about to do that if I have serious
> browser support issue.
>
>
> --
> <><><><><><><><><><><><><><><><><><><>
> John Wynstra
> Library Information Systems Specialist
> Rod Library
> University of Northern Iowa
> Cedar Falls, IA  50613
> wyns...@uni.edu
> (319)273-6399
> <><><><><><><><><><><><><><><><><><><>
>


Re: [CODE4LIB] ipsCA Certs

2009-12-25 Thread Yitzchak Schaffer
Whew.  Just survived an Ubuntu dist-upgrade which broke our Apache SSL 
virtual hosts configuration.  I had thought the foulup on the test 
server was because we were testing various certs in the wake of the root 
CA expiration!


We estimate that 15-25% of our users will be affected (the new root CA 
seems to work in Google Chrome as well as IE), and that a new wildcart 
cert could be had for $40 or $80 from StartSSL for two years - not quite 
sure yet what level verification we'd need, hence the 40/80 doubt.


We're running multiple name-based hosts at one IP address (for 
encryption), hence the reliance on the wildcart cert.  We could 
conceivably get more IP addresses, but I don't know if I want to take 
that one up with IT.  Methinks we're going to try scraping together 
40/80 bucks, which isn't as simple here as it may sound.


Twitter's been very helpful in keeping up with this.

--
Yitzchak Schaffer
Systems Manager
Touro College Libraries
33 West 23rd Street
New York, NY  10010
Tel (212) 463-0400 x5230
Fax (212) 627-3197
Email yitzchak.schaf...@gmx.com

Access Problems? Contact systems.libr...@touro.edu


Re: [CODE4LIB] ipsCA Certs

2009-12-24 Thread susan teague rector
john, we had the same problem. we ended up buying from another vendor 
last minute as this wasn't going to be a smooth process

i can't believe they didn't give us all more notice


John Wynstra wrote:
Out of curiosity, did anyone else using ipsCA certs receive 
notification that due to the coming expiration of their root CA 
(December 29,2009), they would need a reissued cert under a new root CA?


I am uncertain as to how this new Root CA will become a part of the 
browsers trusted roots without some type of user action including a 
software upgrade, but the following library website instructions lead 
me to believe that this is not going to be smooth.  http://bit.ly/53Npel


We are just about to go live with EZProxy in January with an ipsCA 
cert issued a few months ago, and I am not about to do that if I have 
serious browser support issue.





Re: [CODE4LIB] ipsCA Certs

2009-12-18 Thread Nate Vack
On Fri, Dec 18, 2009 at 11:46 AM, John Wynstra  wrote:

> We are going with either Thawte or Digicert since our campus already has
> certs from these Vendors.  My personal experience has been with Thawte, but
> not with their wildcard certs.

Depending on how cheap "cheap" needs to be, I've actually had good
experiences with GoDaddy's wildcard certs. Their site is irritating,
but they're cheap and probably aren't gonna die tomorrow.

Cheers,
-Nate


Re: [CODE4LIB] ipsCA Certs

2009-12-18 Thread John Wynstra

The following from EZProxy list offers some info along these lines.

http://ls.suny.edu/read/archive?id=1183059

The vendor recommended in this post appears to be a reseller(maybe 
owner) of multiple certs including Verisign and Thawte from what I can 
tell.


We are going with either Thawte or Digicert since our campus already has 
certs from these Vendors.  My personal experience has been with Thawte, 
but not with their wildcard certs.


Yitzchak Schaffer wrote:

On 12/18/2009 12:03 PM, John Wynstra wrote:

We are going to purchase a certificate elseware, because we can't wait
for ipsCA root Cert to get into popular browsers.


Ergh.  Anyone have any fresh research on cheap education wildcard certs? 
 We're using SSL on three (soon to be four) publicly-used hosts.  TLD is 
.org though.




--
<><><><><><><><><><><><><><><><><><><>
John Wynstra
Library Information Systems Specialist
Rod Library
University of Northern Iowa
Cedar Falls, IA  50613
wyns...@uni.edu
(319)273-6399
<><><><><><><><><><><><><><><><><><><>


Re: [CODE4LIB] ipsCA Certs

2009-12-18 Thread Yitzchak Schaffer

On 12/18/2009 12:03 PM, John Wynstra wrote:

We are going to purchase a certificate elseware, because we can't wait
for ipsCA root Cert to get into popular browsers.


Ergh.  Anyone have any fresh research on cheap education wildcard certs? 
 We're using SSL on three (soon to be four) publicly-used hosts.  TLD 
is .org though.


--
Yitzchak Schaffer
Systems Manager
Touro College Libraries
33 West 23rd Street
New York, NY  10010
Tel (212) 463-0400 x5230
Fax (212) 627-3197
Email yitzchak.schaf...@gmx.com

Access Problems? Contact systems.libr...@touro.edu


Re: [CODE4LIB] ipsCA Certs

2009-12-18 Thread John Wynstra

I'm done with the worry part at this point.

We are going to purchase a certificate elseware, because we can't wait 
for ipsCA root Cert to get into popular browsers.  It creates a really 
bad user experience if our users are getting what seem to them to be 
"WARNING--YOUR ARE ABOUT TO DIE" messages from their browser when coming 
through or to our site.  If we train them that it is OK to make an 
exception for our cert, we are doing them a disservice and training them 
to take risks.


I know other server admins on campus are purchasing certs also.  I wish 
I was in the certificate business today--not really.


Tim McGeary wrote:
I'm a little dismayed at the eleventh hour posting of the email.  It 
makes it feel illegitimate, but I have had other confirmation that it is 
legit, too.


Another thing to worry about before Christmas...

Tim McGeary
Team Leader, Library Technology
Lehigh University
610-758-4998
tim.mcge...@lehigh.edu

timmcge...@gmail.com
GTalk/Yahoo/Skype: timmcgeary


Walker, David wrote:
I see now that I'm looking at the intermediate certificate.  The root 
does expire in 2009.


Nevermind. :-)

--Dave

==
David Walker
Library Web Services Manager
California State University
http://xerxes.calstate.edu

From: Walker, David
Sent: Thursday, December 17, 2009 1:40 PM
To: Code for Libraries
Subject: RE: [CODE4LIB] ipsCA Certs

Hi John,

I also got this email. We also recently installed an ipsCA wildcard 
cert for a test EZProxy install.


Looking at the details of our ipsCA wildcard certificate in Firefox, 
though, I can see the chain of certificates going up to the root ipsCA 
cert.


Firefox says that that root certificate -- ipsCA CLASEA1 Certificate 
Authority -- is good until 2025. I see the same thing in IE, Safari, 
and I assume every other browser I might check.


Do you see that too?

--Dave

==
David Walker
Library Web Services Manager
California State University
http://xerxes.calstate.edu

From: Code for Libraries [code4...@listserv.nd.edu] On Behalf Of John 
Wynstra [john.wyns...@uni.edu]

Sent: Thursday, December 17, 2009 1:02 PM
To: CODE4LIB@LISTSERV.ND.EDU
Subject: [CODE4LIB] ipsCA Certs

Out of curiosity, did anyone else using ipsCA certs receive notification
that due to the coming expiration of their root CA (December 29,2009),
they would need a reissued cert under a new root CA?

I am uncertain as to how this new Root CA will become a part of the
browsers trusted roots without some type of user action including a
software upgrade, but the following library website instructions lead me
to believe that this is not going to be smooth.  http://bit.ly/53Npel

We are just about to go live with EZProxy in January with an ipsCA cert
issued a few months ago, and I am not about to do that if I have serious
browser support issue.


--
<><><><><><><><><><><><><><><><><><><>
John Wynstra
Library Information Systems Specialist
Rod Library
University of Northern Iowa
Cedar Falls, IA  50613
wyns...@uni.edu
(319)273-6399
<><><><><><><><><><><><><><><><><><><>






--
<><><><><><><><><><><><><><><><><><><>
John Wynstra
Library Information Systems Specialist
Rod Library
University of Northern Iowa
Cedar Falls, IA  50613
wyns...@uni.edu
(319)273-6399
<><><><><><><><><><><><><><><><><><><>


Re: [CODE4LIB] ipsCA Certs

2009-12-18 Thread Tim McGeary
I'm a little dismayed at the eleventh hour posting of the email.  It 
makes it feel illegitimate, but I have had other confirmation that it is 
legit, too.


Another thing to worry about before Christmas...

Tim McGeary
Team Leader, Library Technology
Lehigh University
610-758-4998
tim.mcge...@lehigh.edu

timmcge...@gmail.com
GTalk/Yahoo/Skype: timmcgeary


Walker, David wrote:

I see now that I'm looking at the intermediate certificate.  The root does 
expire in 2009.

Nevermind. :-)

--Dave

==
David Walker
Library Web Services Manager
California State University
http://xerxes.calstate.edu

From: Walker, David
Sent: Thursday, December 17, 2009 1:40 PM
To: Code for Libraries
Subject: RE: [CODE4LIB] ipsCA Certs

Hi John,

I also got this email. We also recently installed an ipsCA wildcard cert for a 
test EZProxy install.

Looking at the details of our ipsCA wildcard certificate in Firefox, though, I 
can see the chain of certificates going up to the root ipsCA cert.

Firefox says that that root certificate -- ipsCA CLASEA1 Certificate Authority 
-- is good until 2025. I see the same thing in IE, Safari, and I assume every 
other browser I might check.

Do you see that too?

--Dave

==
David Walker
Library Web Services Manager
California State University
http://xerxes.calstate.edu

From: Code for Libraries [code4...@listserv.nd.edu] On Behalf Of John Wynstra 
[john.wyns...@uni.edu]
Sent: Thursday, December 17, 2009 1:02 PM
To: CODE4LIB@LISTSERV.ND.EDU
Subject: [CODE4LIB] ipsCA Certs

Out of curiosity, did anyone else using ipsCA certs receive notification
that due to the coming expiration of their root CA (December 29,2009),
they would need a reissued cert under a new root CA?

I am uncertain as to how this new Root CA will become a part of the
browsers trusted roots without some type of user action including a
software upgrade, but the following library website instructions lead me
to believe that this is not going to be smooth.  http://bit.ly/53Npel

We are just about to go live with EZProxy in January with an ipsCA cert
issued a few months ago, and I am not about to do that if I have serious
browser support issue.


--
<><><><><><><><><><><><><><><><><><><>
John Wynstra
Library Information Systems Specialist
Rod Library
University of Northern Iowa
Cedar Falls, IA  50613
wyns...@uni.edu
(319)273-6399
<><><><><><><><><><><><><><><><><><><>



Re: [CODE4LIB] ipsCA Certs

2009-12-17 Thread Walker, David
I see now that I'm looking at the intermediate certificate.  The root does 
expire in 2009.

Nevermind. :-)

--Dave

==
David Walker
Library Web Services Manager
California State University
http://xerxes.calstate.edu

From: Walker, David
Sent: Thursday, December 17, 2009 1:40 PM
To: Code for Libraries
Subject: RE: [CODE4LIB] ipsCA Certs

Hi John,

I also got this email. We also recently installed an ipsCA wildcard cert for a 
test EZProxy install.

Looking at the details of our ipsCA wildcard certificate in Firefox, though, I 
can see the chain of certificates going up to the root ipsCA cert.

Firefox says that that root certificate -- ipsCA CLASEA1 Certificate Authority 
-- is good until 2025. I see the same thing in IE, Safari, and I assume every 
other browser I might check.

Do you see that too?

--Dave

==
David Walker
Library Web Services Manager
California State University
http://xerxes.calstate.edu

From: Code for Libraries [code4...@listserv.nd.edu] On Behalf Of John Wynstra 
[john.wyns...@uni.edu]
Sent: Thursday, December 17, 2009 1:02 PM
To: CODE4LIB@LISTSERV.ND.EDU
Subject: [CODE4LIB] ipsCA Certs

Out of curiosity, did anyone else using ipsCA certs receive notification
that due to the coming expiration of their root CA (December 29,2009),
they would need a reissued cert under a new root CA?

I am uncertain as to how this new Root CA will become a part of the
browsers trusted roots without some type of user action including a
software upgrade, but the following library website instructions lead me
to believe that this is not going to be smooth.  http://bit.ly/53Npel

We are just about to go live with EZProxy in January with an ipsCA cert
issued a few months ago, and I am not about to do that if I have serious
browser support issue.


--
<><><><><><><><><><><><><><><><><><><>
John Wynstra
Library Information Systems Specialist
Rod Library
University of Northern Iowa
Cedar Falls, IA  50613
wyns...@uni.edu
(319)273-6399
<><><><><><><><><><><><><><><><><><><>


Re: [CODE4LIB] ipsCA Certs

2009-12-17 Thread Walker, David
Hi John,

I also got this email. We also recently installed an ipsCA wildcard cert for a 
test EZProxy install.

Looking at the details of our ipsCA wildcard certificate in Firefox, though, I 
can see the chain of certificates going up to the root ipsCA cert.  

Firefox says that that root certificate -- ipsCA CLASEA1 Certificate Authority 
-- is good until 2025. I see the same thing in IE, Safari, and I assume every 
other browser I might check.

Do you see that too?

--Dave

==
David Walker
Library Web Services Manager
California State University
http://xerxes.calstate.edu

From: Code for Libraries [code4...@listserv.nd.edu] On Behalf Of John Wynstra 
[john.wyns...@uni.edu]
Sent: Thursday, December 17, 2009 1:02 PM
To: CODE4LIB@LISTSERV.ND.EDU
Subject: [CODE4LIB] ipsCA Certs

Out of curiosity, did anyone else using ipsCA certs receive notification
that due to the coming expiration of their root CA (December 29,2009),
they would need a reissued cert under a new root CA?

I am uncertain as to how this new Root CA will become a part of the
browsers trusted roots without some type of user action including a
software upgrade, but the following library website instructions lead me
to believe that this is not going to be smooth.  http://bit.ly/53Npel

We are just about to go live with EZProxy in January with an ipsCA cert
issued a few months ago, and I am not about to do that if I have serious
browser support issue.


--
<><><><><><><><><><><><><><><><><><><>
John Wynstra
Library Information Systems Specialist
Rod Library
University of Northern Iowa
Cedar Falls, IA  50613
wyns...@uni.edu
(319)273-6399
<><><><><><><><><><><><><><><><><><><>


Re: [CODE4LIB] ipsCA Certs

2009-12-17 Thread John Wynstra
Thanks Amy.  I'll join that list.  Would have been a more appropriate 
place for this post.


Weidner, Amy wrote:

Hi, John.  I sure did.  Looks like the email is legit.  Lots of talk about it on 
the ezproxy listserv today, here's the archive: 
http://ls.suny.edu/read/?forum=ezproxy&sb=1

In short from those who have installed the new cert, there are no problems with 
IE but Firefox, Safari and Chrome are experiencing certificate warnings.  HTH

Amy Weidner
Digital Resources Librarian
Benedictine University
630/ 829.6066
630/ 960.9451 (fax)
aweid...@ben.edu


-Original Message-
From: Code for Libraries [mailto:code4...@listserv.nd.edu] On Behalf Of John 
Wynstra
Sent: Thursday, December 17, 2009 3:02 PM
To: CODE4LIB@LISTSERV.ND.EDU
Subject: [CODE4LIB] ipsCA Certs

Out of curiosity, did anyone else using ipsCA certs receive notification 
that due to the coming expiration of their root CA (December 29,2009), 
they would need a reissued cert under a new root CA?


I am uncertain as to how this new Root CA will become a part of the 
browsers trusted roots without some type of user action including a 
software upgrade, but the following library website instructions lead me 
to believe that this is not going to be smooth.  http://bit.ly/53Npel


We are just about to go live with EZProxy in January with an ipsCA cert 
issued a few months ago, and I am not about to do that if I have serious 
browser support issue.





--
<><><><><><><><><><><><><><><><><><><>
John Wynstra
Library Information Systems Specialist
Rod Library
University of Northern Iowa
Cedar Falls, IA  50613
wyns...@uni.edu
(319)273-6399
<><><><><><><><><><><><><><><><><><><>


Re: [CODE4LIB] ipsCA Certs

2009-12-17 Thread Weidner, Amy
Hi, John.  I sure did.  Looks like the email is legit.  Lots of talk about it 
on the ezproxy listserv today, here's the archive: 
http://ls.suny.edu/read/?forum=ezproxy&sb=1

In short from those who have installed the new cert, there are no problems with 
IE but Firefox, Safari and Chrome are experiencing certificate warnings.  HTH

Amy Weidner
Digital Resources Librarian
Benedictine University
630/ 829.6066
630/ 960.9451 (fax)
aweid...@ben.edu


-Original Message-
From: Code for Libraries [mailto:code4...@listserv.nd.edu] On Behalf Of John 
Wynstra
Sent: Thursday, December 17, 2009 3:02 PM
To: CODE4LIB@LISTSERV.ND.EDU
Subject: [CODE4LIB] ipsCA Certs

Out of curiosity, did anyone else using ipsCA certs receive notification 
that due to the coming expiration of their root CA (December 29,2009), 
they would need a reissued cert under a new root CA?

I am uncertain as to how this new Root CA will become a part of the 
browsers trusted roots without some type of user action including a 
software upgrade, but the following library website instructions lead me 
to believe that this is not going to be smooth.  http://bit.ly/53Npel

We are just about to go live with EZProxy in January with an ipsCA cert 
issued a few months ago, and I am not about to do that if I have serious 
browser support issue.


-- 
<><><><><><><><><><><><><><><><><><><>
John Wynstra
Library Information Systems Specialist
Rod Library
University of Northern Iowa
Cedar Falls, IA  50613
wyns...@uni.edu
(319)273-6399
<><><><><><><><><><><><><><><><><><><>


[CODE4LIB] ipsCA Certs

2009-12-17 Thread John Wynstra
Out of curiosity, did anyone else using ipsCA certs receive notification 
that due to the coming expiration of their root CA (December 29,2009), 
they would need a reissued cert under a new root CA?


I am uncertain as to how this new Root CA will become a part of the 
browsers trusted roots without some type of user action including a 
software upgrade, but the following library website instructions lead me 
to believe that this is not going to be smooth.  http://bit.ly/53Npel


We are just about to go live with EZProxy in January with an ipsCA cert 
issued a few months ago, and I am not about to do that if I have serious 
browser support issue.



--
<><><><><><><><><><><><><><><><><><><>
John Wynstra
Library Information Systems Specialist
Rod Library
University of Northern Iowa
Cedar Falls, IA  50613
wyns...@uni.edu
(319)273-6399
<><><><><><><><><><><><><><><><><><><>