Hi all,
I was just reading through the baseline requirements -- specifically 3.2.2.4
and its children -- and noted that while there are particular standards as to
the blessed methods of validation of authority & control for domain names (and
host names within domain names), there is nothing
> On Jul 17, 2017, at 15:27, Nick Lamb via dev-security-policy
> wrote:
>
> On Monday, 17 July 2017 16:22:22 UTC+1, Ben Wilson wrote:
>> Thank you for bringing this to our attention. We have contacted Intesa
>> Sanpaolo regarding this error and have
On Monday, 17 July 2017 16:22:22 UTC+1, Ben Wilson wrote:
> Thank you for bringing this to our attention. We have contacted Intesa
> Sanpaolo regarding this error and have asked them to correct it as soon as
> possible.
"Correcting" the error is surely the smaller of the two tasks ahead.
Dear Jonathan,
Thank you for bringing this to our attention. We have contacted Intesa
Sanpaolo regarding this error and have asked them to correct it as soon as
possible.
Sincerely yours,
Ben Wilson, JD, CISA, CISSP
DigiCert VP of Compliance
-Original Message-
From:
This certificate, issued by “Intesa Sanpaolo CA Servizi Esterni Enhanced” which
chains up to a Baltimore CyberTrust root, contains an invalid dnsName of
“www.intesasanpaolovita..biz” (note the two dots):
5 matches
Mail list logo