Dynamic/Wildcard SSL certificates with SNI ?

Rainer Duffner rainer at ultra-secure.de
Thu Jan 15 20:13:21 UTC 2015


> Am 15.01.2015 um 20:50 schrieb Gabriel L. Somlo <gsomlo at gmail.com>:
> 
> Hi,
> 
> I'm working on a "Web simulator" designed to serve a large number of
> web sites on a private, self-contained network, where I'm also in
> control of issuing SSL certificates.
> 
> The relevant bits of my nginx.conf look like this:
> 
>    server {
>      listen 80 default_server;
>      server_name $http_host;
>      root /var/www/vservers/$http_host;
>      index index.html index.htm;
>    }
> 
>    ssl_certificate_key /var/www/vserver_certs/vserver.key;
> 
>    server {
>      listen 443 default_server;
>      ssl on;
>      ssl_certificate /var/www/vserver_certs/vserver.cer;
>      server_name $http_host;
>      root /var/www/vservers/$http_host;
>      index index_html index.htm;
>    }
> 
> 
> There is no consistency across the set of vserver host names (and
> therefore not much to be gained by using wildcards in the certificate
> common or alt name fields).



Just issue a certificate for *.*.* and always serve that.

At least, until the CAB-forum decides this is a not a good idea and stops browsers from accepting it.
I think the above certificate should still be legal, but I’m not 100% sure.





More information about the nginx mailing list