<div dir="auto">All of my certs are self signed from my own CA. If you don&#39;t trust them, you don&#39;t need to be there anyway.</div><div class="gmail_extra"><br><div class="gmail_quote">On Jan 30, 2017 4:14 PM, &quot;Jeremy T. Bouse&quot; &lt;<a href="mailto:jeremy.bouse@undergrid.net">jeremy.bouse@undergrid.net</a>&gt; wrote:<br type="attribution"><blockquote class="gmail_quote" style="margin:0 0 0 .8ex;border-left:1px #ccc solid;padding-left:1ex">
  
    
  
  <div bgcolor="#FFFFFF" text="#000000">
    On 1/30/2017 4:04 PM, Lightner, Jeffrey wrote:<br>
    <blockquote type="cite">
      
      
      
      <div class="m_-7398971369394639823WordSection1">
        <p class="MsoNormal"><span style="font-size:11.0pt;font-family:&quot;Calibri&quot;,&quot;sans-serif&quot;;color:#1f497d">+1
            <br>
            We started using Digicert instead of Verisign a few years
            back and other than the need to install new root
            certificates on some of our stuff that didn’t know about
            Digicert early on we haven’t had any issues.  
            <u></u><u></u></span></p>
        <p class="MsoNormal"><span style="font-size:11.0pt;font-family:&quot;Calibri&quot;,&quot;sans-serif&quot;;color:#1f497d"><u></u> <u></u></span></p>
        <p class="MsoNormal"><b><span style="font-size:10.0pt;font-family:&quot;Tahoma&quot;,&quot;sans-serif&quot;">From:</span></b><span style="font-size:10.0pt;font-family:&quot;Tahoma&quot;,&quot;sans-serif&quot;">
            <a class="m_-7398971369394639823moz-txt-link-abbreviated" href="mailto:ale-bounces@ale.org" target="_blank">ale-bounces@ale.org</a> [<a class="m_-7398971369394639823moz-txt-link-freetext" href="mailto:ale-bounces@ale.org" target="_blank">mailto:ale-bounces@ale.org</a>]
            <b>On Behalf Of </b>James Sumners<br>
            <b>Sent:</b> Monday, January 30, 2017 3:41 PM<br>
            <b>To:</b> Atlanta Linux Enthusiasts<br>
            <b>Subject:</b> Re: [ale] Oct News: StartCom, WoSign
            distrusted by Mozilla, Google, Apple<u></u><u></u></span></p>
        <p class="MsoNormal"><u></u> <u></u></p>
        <div>
          <p class="MsoNormal">We use DigiCert at work and haven&#39;t ever
            had any issues. I actually really like their support and
            information they have in their help section.<u></u><u></u></p>
          <div>
            <p class="MsoNormal"><u></u> <u></u></p>
          </div>
          <div>
            <p class="MsoNormal">Personally, I use <a href="http://letsencrypt.org" target="_blank">letsencrypt.org</a>.
              The official client is awful, but this one is great -- <a href="https://github.com/hlandau/acme" target="_blank">https://github.com/hlandau/<wbr>acme</a><u></u><u></u></p>
          </div>
        </div>
        <div>
          <p class="MsoNormal"><u></u> <u></u></p>
          <div>
            <p class="MsoNormal">On Mon, Jan 30, 2017 at 3:08 PM, Brian
              W. Neu &lt;<a href="mailto:ale@advancedopen.com" target="_blank">ale@advancedopen.com</a>&gt;
              wrote:<u></u><u></u></p>
            <p class="MsoNormal">Randomly logged into my StartCom
              account today to see all kinds of red text about free
              verifications and expirations and workarounds.<br>
              <br>
              Through a little reading, it&#39;s clear that the Mozilla
              Foundation and Google have both announced that they are
              distrusting the StartCom and WoSign CA&#39;s due to deceptive
              practices unbecoming of a certificate authority.  The
              short story is that WoSign, a Chinese company claiming 70%
              of the certificate market in China, was allowing for the
              backdating of new SHA1 signings to avoid some kind of
              sunset imposed by Microsoft and others.  WoSign also
              acquired StartCom in 2015, and purposely hid this from the
              public, even denied it to the Mozilla Foundation until
              irrefutable evidence surfaced.<br>
              <br>
              Looks like StartCom is trying to mitigate damage by
              spinning off as a separate entity, but what a disaster! 
              Any alternative CA&#39;s led by non-shady businessmen? 
              Comodo?<br>
              <br>
              <a href="https://blog.mozilla.org/security/2016/10/24/distrusting-new-wosign-and-startcom-certificates/" target="_blank">https://blog.mozilla.org/<wbr>security/2016/10/24/<wbr>distrusting-new-wosign-and-<wbr>startcom-certificates/</a>
              <br>
              <br>
              <a href="https://en.wikipedia.org/wiki/StartCom" target="_blank">https://en.wikipedia.org/wiki/<wbr>StartCom</a><br>
              <br>
              <a href="https://www.thesslstore.com/blog/wosign-startcom-separated/" target="_blank">https://www.thesslstore.com/<wbr>blog/wosign-startcom-<wbr>separated/</a><br>
              <br>
              <a href="https://security.googleblog.com/2016/10/distrusting-wosign-and-startcom.html" target="_blank">https://security.googleblog.<wbr>com/2016/10/distrusting-<wbr>wosign-and-startcom.html</a><br>
            </p>
          </div>
        </div>
      </div>
    </blockquote>
       Yeah, I&#39;d probably use DigiCert over Verisign if I had $299 for
    each multi-SAN certificate I needed vs the $120/year I pay to
    StartCom for unlimited multi-SAN certificates and I only need to pay
    that every 2-3 years honestly if I don&#39;t need to issue any new
    certificates between expirations. <br>
  </div>

<br>______________________________<wbr>_________________<br>
Ale mailing list<br>
<a href="mailto:Ale@ale.org">Ale@ale.org</a><br>
<a href="http://mail.ale.org/mailman/listinfo/ale" rel="noreferrer" target="_blank">http://mail.ale.org/mailman/<wbr>listinfo/ale</a><br>
See JOBS, ANNOUNCE and SCHOOLS lists at<br>
<a href="http://mail.ale.org/mailman/listinfo" rel="noreferrer" target="_blank">http://mail.ale.org/mailman/<wbr>listinfo</a><br>
<br></blockquote></div></div>