and not a single Tor hacker was surprised...

rysiek rysiek@hackerspace.pl
Wed Feb 12 16:26:18 PST 2014


Dnia środa, 22 stycznia 2014 18:47:12 katana pisze:
> Hi,
> 
> > About this. Is there a way to serve 2 (or more) certificates for a
> > given HTTPS server/domain? What I would like to have is a way to: -
> > serve a proper, vanilla SSL certificate bought from some provider for
> > the general public accessing my service; - serve a different cert
> > (for example, using MonkeySphere) for those that do not trust (and
> > with good reasons) major CA's.
> > 
> > This would have to work for the *same* domain on the *same*
> > webserver. I haven't yet seen a way to do this, so this might need
> > implementing, but maybe somebody here has heard about something along
> > these lines?
> 
> Like the Soveraign or TACKed keys perhaps?
> <https://www.eff.org/deeplinks/2011/11/sovereign-keys-proposal-make-https-an
> d-email-more-secure>
> <http://arstechnica.com/security/2012/05/ssl-fix-flags-forged-certificates-> before-theyre-accepted-by-browsers/>

Thanks!

-- 
Pozdr
rysiek
-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 316 bytes
Desc: This is a digitally signed message part.
URL: <http://cpunks.org/pipermail/cypherpunks/attachments/20140213/1c319b4d/attachment.sig>


More information about the cypherpunks mailing list