Hi Ognjen,

Reading the pdf link you provided it seems that I should use ip based
certificates and for each different ip which needs certificate I will have
to request one.

I should use -ext san=ip:$ip instead of -ext san=dns:$host.
Then CA will not drop the details.

Regards,

Miten.



On Fri, Jan 17, 2014 at 7:30 PM, Ognjen Blagojevic <
ognjen.d.blagoje...@gmail.com> wrote:

> Miten,
>
>
> On 17.1.2014 14:33, Miten Mehta wrote:
>
>> The catalina.out complaines with SSL handshake stating No Name matching
>> mhoodws.ril.local found.
>>
>
> For security reasons, CA shouldn't sign any certificate containing
> internal server name (either as CN, or subjectAltName):
>
> "As of July 1, 2012, all CAs were required to notify customers applying
> for internal name certificates that the use of such certificates has been
> deprecated by the CA / Browser Forum and that the practice will be
> eliminated by October 2016."
>
> https://cabforum.org/internal-names/
>
> So, I guess your CA removed subjectAltName while signing the certificate,
> and also missed to notify you about the removal.
>
> -Ognjen
>
>
>
> ---------------------------------------------------------------------
> To unsubscribe, e-mail: users-unsubscr...@tomcat.apache.org
> For additional commands, e-mail: users-h...@tomcat.apache.org
>
>

Reply via email to