[tor-relays] Watching the attacks on my relay

mick mbm at rlogin.net
Sat Nov 9 12:50:18 UTC 2013

On Fri, 08 Nov 2013 20:15:51 +0100
elrippo <elrippo at elrippoisland.net> allegedly wrote:

> Jope. I tend to have some issues with some CA's.
> But yes you are right, i should get me a decent certificate.
> I will do that, promise.
> You self signed your site certificate...? 
I don't see any problem per se with a self-signed certificate on a site
which does not purport to protect anything sensitive (such as financial
transactions). The problem with this particular certificate is that
the common name identifier is both wrong (www) and badly formattted
(http://) But both of those errors can be corrected very quickly.

Why pay a CA if you don't trust the CA model?



 Mick Morgan
 gpg fingerprint: FC23 3338 F664 5E66 876B  72C0 0A1F E60B 5BAD D312


-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 836 bytes
Desc: not available
URL: <http://lists.torproject.org/pipermail/tor-relays/attachments/20131109/9ecde9c2/attachment.sig>

More information about the tor-relays mailing list