You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
This subdomain sends an expired stapled OCSP response, which triggers
an SSL error in Firefox (and soon in Chrome as well).
The OCSP response, certs/wildcard.expired-ocsp.der, was generated by running:
openssl ocsp -issuer certs/wildcard.issuer.pem -cert certs/wildcard.normal.pem -url http://ocsp.comodoca.com -noverify -respout certs/wildcard.expired-ocsp.der
where certs/wildcard.issuer.pem contains the certificate that issued
certs/wildcard.normal.pem (i.e. the first intermediate certificate in
the chain). http://ocsp.comodoca.com was taken from the OCSP field as
output by `openssl x509 -in certs/wildcard.normal.pem -noout -text`.
certs/wildcard.expired-ocsp.der will need to be regenerated whenever
wildcard.normal.pem is reissued.
Note that, at the time of this commit, certs/wildcard.expired-ocsp.der
is not yet expired, but will expire on Jun 8, 2015 at 09:38:45 UTC.
0 commit comments