Skip to content
  • Categories
  • Recent
  • Tags
  • Popular
  • World
  • Users
  • Groups
Skins
  • Light
  • Cerulean
  • Cosmo
  • Flatly
  • Journal
  • Litera
  • Lumen
  • Lux
  • Materia
  • Minty
  • Morph
  • Pulse
  • Sandstone
  • Simplex
  • Sketchy
  • Spacelab
  • United
  • Yeti
  • Zephyr
  • Dark
  • Cyborg
  • Darkly
  • Quartz
  • Slate
  • Solar
  • Superhero
  • Vapor

  • Default (No Skin)
  • No Skin
Collapse
Code Project
  1. Home
  2. The Lounge
  3. SSL certificate provider

SSL certificate provider

Scheduled Pinned Locked Moved The Lounge
questioncomgame-devsecuritycryptography
15 Posts 6 Posters 1 Views 1 Watching
  • Oldest to Newest
  • Newest to Oldest
  • Most Votes
Reply
  • Reply as topic
Log in to reply
This topic has been deleted. Only users with topic management privileges can see it.
  • J Offline
    J Offline
    Jan R Hansen
    wrote on last edited by
    #1

    Hi, We're developing a website for a customer that requires a https connection. I don't know much about the SSL-game at all, but have discovered that a such certificate can be issued by several different authorities. For instance, the main phone service provider in Denmark charges $800 for a certificate valid for two years, whereas e.g. ssl.com offers a three year certificate for $619. Quite a difference, half the price.... What should we consider when choosing between these providers ? Price is one issue here, but given that we can talk the customer into paying for the most expensive solution - then what matters ? You get to use different "trusted by"-logos of which nobody hardly knows anything besides the one from Verisign, you'll get different levels of support if you can't get things working. Talking about Verisign - they offer a 40 bit certificate valid for two years for $598 and a 128 bit certificate (two years as well) for $1595.... Please let me know what you think about this. Should we go for the cheapest solution ? How many bits is considered a "minimum" ? What does it take for a company to be able to issue such certificates ? What is one really guaranteed when using a https connection? Any thoughts are most welcome. Thanks in advance guys 'n' gals. /Jan Do you know why it's important to make fast decisions? Because you give yourself more time to correct your mistakes, when you find out that you made the wrong one. Chris Meech on deciding whether to go to his daughters graduation or a Neil Young concert

    S S A N R 5 Replies Last reply
    0
    • J Jan R Hansen

      Hi, We're developing a website for a customer that requires a https connection. I don't know much about the SSL-game at all, but have discovered that a such certificate can be issued by several different authorities. For instance, the main phone service provider in Denmark charges $800 for a certificate valid for two years, whereas e.g. ssl.com offers a three year certificate for $619. Quite a difference, half the price.... What should we consider when choosing between these providers ? Price is one issue here, but given that we can talk the customer into paying for the most expensive solution - then what matters ? You get to use different "trusted by"-logos of which nobody hardly knows anything besides the one from Verisign, you'll get different levels of support if you can't get things working. Talking about Verisign - they offer a 40 bit certificate valid for two years for $598 and a 128 bit certificate (two years as well) for $1595.... Please let me know what you think about this. Should we go for the cheapest solution ? How many bits is considered a "minimum" ? What does it take for a company to be able to issue such certificates ? What is one really guaranteed when using a https connection? Any thoughts are most welcome. Thanks in advance guys 'n' gals. /Jan Do you know why it's important to make fast decisions? Because you give yourself more time to correct your mistakes, when you find out that you made the wrong one. Chris Meech on deciding whether to go to his daughters graduation or a Neil Young concert

      S Offline
      S Offline
      Stefan Pedersen
      wrote on last edited by
      #2

      Pick one CA that is trusted by the client (Internet Explorer/Mozilla/Whatever). The hassle of having the endusers install a new trusted CA ain't worth it IHMO. https guarantees... Depends on the server-settings I guess (I haven't worked that much with https, only SSL). It could be the whole scale from nothing att all (no auth, no crypt) to the whole enchilada (client+server auth and encrption). Most common setting (or the only allowed by https?) seems to be server auth and encryption. And suddenly you realize / Nothing here is what it seems / You are beyond the looking glass / Like Alice and the red queen Red Queen, Funker Vogt

      1 Reply Last reply
      0
      • J Jan R Hansen

        Hi, We're developing a website for a customer that requires a https connection. I don't know much about the SSL-game at all, but have discovered that a such certificate can be issued by several different authorities. For instance, the main phone service provider in Denmark charges $800 for a certificate valid for two years, whereas e.g. ssl.com offers a three year certificate for $619. Quite a difference, half the price.... What should we consider when choosing between these providers ? Price is one issue here, but given that we can talk the customer into paying for the most expensive solution - then what matters ? You get to use different "trusted by"-logos of which nobody hardly knows anything besides the one from Verisign, you'll get different levels of support if you can't get things working. Talking about Verisign - they offer a 40 bit certificate valid for two years for $598 and a 128 bit certificate (two years as well) for $1595.... Please let me know what you think about this. Should we go for the cheapest solution ? How many bits is considered a "minimum" ? What does it take for a company to be able to issue such certificates ? What is one really guaranteed when using a https connection? Any thoughts are most welcome. Thanks in advance guys 'n' gals. /Jan Do you know why it's important to make fast decisions? Because you give yourself more time to correct your mistakes, when you find out that you made the wrong one. Chris Meech on deciding whether to go to his daughters graduation or a Neil Young concert

        S Offline
        S Offline
        Steve McLenithan
        wrote on last edited by
        #3

        Checkout GoDaddy.com Well known name and dirt cheap prices on certificates. Never used one myself but I probably would if I ever need to. Has anyone else used GoDaddy for SSL? https://www.godaddy.com/gdshop/ssl/ssl.asp?se=%2B&sourceStr=ndjjohjahhwifjhgafxcwaehgdgbcdzflfdachnfdigeqdmjviqaidmgrbsdvcxb&ci=271[^]

        Found on Bash.org [erno] hm. I've lost a machine.. literally _lost_. it responds to ping, it works completely, I just can't figure out where in my apartment it is.

        1 Reply Last reply
        0
        • J Jan R Hansen

          Hi, We're developing a website for a customer that requires a https connection. I don't know much about the SSL-game at all, but have discovered that a such certificate can be issued by several different authorities. For instance, the main phone service provider in Denmark charges $800 for a certificate valid for two years, whereas e.g. ssl.com offers a three year certificate for $619. Quite a difference, half the price.... What should we consider when choosing between these providers ? Price is one issue here, but given that we can talk the customer into paying for the most expensive solution - then what matters ? You get to use different "trusted by"-logos of which nobody hardly knows anything besides the one from Verisign, you'll get different levels of support if you can't get things working. Talking about Verisign - they offer a 40 bit certificate valid for two years for $598 and a 128 bit certificate (two years as well) for $1595.... Please let me know what you think about this. Should we go for the cheapest solution ? How many bits is considered a "minimum" ? What does it take for a company to be able to issue such certificates ? What is one really guaranteed when using a https connection? Any thoughts are most welcome. Thanks in advance guys 'n' gals. /Jan Do you know why it's important to make fast decisions? Because you give yourself more time to correct your mistakes, when you find out that you made the wrong one. Chris Meech on deciding whether to go to his daughters graduation or a Neil Young concert

          A Offline
          A Offline
          Anders Molin
          wrote on last edited by
          #4

          SSL Certificates is used for 2 things: 1) Encryption of the traffic between the client and the server, even the headers are encrypted which is why a webserver can only run a single SSL site (it can not look at the header and see which domainname is requested) 2) Prove that the website is the real one... You can always look at a certificate, when visiting a site, and see who it is issued to. The issuer makes quite some work to confirm that they only issue a certificate to the "real company" and not someone trying to pretend to be you and then cheating customers... The "identity trust" certificates are the expensive ones, and until lately the only one you cound get... Lately godaddy has started offering certificates for encryption only, they are way cheaper as they don't have to make sure that you really is you... Both types gives the same encryption, but not the same trust ;) - Anders Bill's Bar
          My Photos

          WDevs - The worlds first DSP, free blog space, email and more. Now also with forums :)

          J 1 Reply Last reply
          0
          • J Jan R Hansen

            Hi, We're developing a website for a customer that requires a https connection. I don't know much about the SSL-game at all, but have discovered that a such certificate can be issued by several different authorities. For instance, the main phone service provider in Denmark charges $800 for a certificate valid for two years, whereas e.g. ssl.com offers a three year certificate for $619. Quite a difference, half the price.... What should we consider when choosing between these providers ? Price is one issue here, but given that we can talk the customer into paying for the most expensive solution - then what matters ? You get to use different "trusted by"-logos of which nobody hardly knows anything besides the one from Verisign, you'll get different levels of support if you can't get things working. Talking about Verisign - they offer a 40 bit certificate valid for two years for $598 and a 128 bit certificate (two years as well) for $1595.... Please let me know what you think about this. Should we go for the cheapest solution ? How many bits is considered a "minimum" ? What does it take for a company to be able to issue such certificates ? What is one really guaranteed when using a https connection? Any thoughts are most welcome. Thanks in advance guys 'n' gals. /Jan Do you know why it's important to make fast decisions? Because you give yourself more time to correct your mistakes, when you find out that you made the wrong one. Chris Meech on deciding whether to go to his daughters graduation or a Neil Young concert

            N Offline
            N Offline
            Neville Franks
            wrote on last edited by
            #5

            I have had absolutely no problems with my "GeoTrust QuickSSL certificate" purchased from ev1Servers for $US49. GeoTrust is widely recognized and the eV1 price is consderably less than buying the same thing from GeoTrust themselves. See: http://www.ev1servers.net/english/quickssldetails.asp[^] I use my Cert on www.getsoft.com FYI. Neville Franks, Author of ED for Windows www.getsoft.com and Surfulater www.surfulater.com "Save what you Surf"

            1 Reply Last reply
            0
            • A Anders Molin

              SSL Certificates is used for 2 things: 1) Encryption of the traffic between the client and the server, even the headers are encrypted which is why a webserver can only run a single SSL site (it can not look at the header and see which domainname is requested) 2) Prove that the website is the real one... You can always look at a certificate, when visiting a site, and see who it is issued to. The issuer makes quite some work to confirm that they only issue a certificate to the "real company" and not someone trying to pretend to be you and then cheating customers... The "identity trust" certificates are the expensive ones, and until lately the only one you cound get... Lately godaddy has started offering certificates for encryption only, they are way cheaper as they don't have to make sure that you really is you... Both types gives the same encryption, but not the same trust ;) - Anders Bill's Bar
              My Photos

              WDevs - The worlds first DSP, free blog space, email and more. Now also with forums :)

              J Offline
              J Offline
              Jan R Hansen
              wrote on last edited by
              #6

              Hi Anders, Thanks for the answer. Are you absolutely sure that a webserver can run only one SSL site ? As far as I recall, the certificate is defined per website - but I might be wrong. Also, it appears to be a very "expensive" limitation of the setup, as you would need one physical server per certificate installed. Or am I missing something here... :) Do you know why it's important to make fast decisions? Because you give yourself more time to correct your mistakes, when you find out that you made the wrong one. Chris Meech on deciding whether to go to his daughters graduation or a Neil Young concert

              R 1 Reply Last reply
              0
              • J Jan R Hansen

                Hi Anders, Thanks for the answer. Are you absolutely sure that a webserver can run only one SSL site ? As far as I recall, the certificate is defined per website - but I might be wrong. Also, it appears to be a very "expensive" limitation of the setup, as you would need one physical server per certificate installed. Or am I missing something here... :) Do you know why it's important to make fast decisions? Because you give yourself more time to correct your mistakes, when you find out that you made the wrong one. Chris Meech on deciding whether to go to his daughters graduation or a Neil Young concert

                R Offline
                R Offline
                Rocky Moore
                wrote on last edited by
                #7

                Actually, you are limited to one SSL per IP. You can handle hundreds per server as long as they each have their own IP. Since the headers are encrypted, you cannot see the header to use a multi-homed server on a single IP. So, you only need to have your ISP give you a new IP address for each SSL site. Rocky <>< Mozilla/Firefox Crushing IE's Lead![^]

                J 1 Reply Last reply
                0
                • J Jan R Hansen

                  Hi, We're developing a website for a customer that requires a https connection. I don't know much about the SSL-game at all, but have discovered that a such certificate can be issued by several different authorities. For instance, the main phone service provider in Denmark charges $800 for a certificate valid for two years, whereas e.g. ssl.com offers a three year certificate for $619. Quite a difference, half the price.... What should we consider when choosing between these providers ? Price is one issue here, but given that we can talk the customer into paying for the most expensive solution - then what matters ? You get to use different "trusted by"-logos of which nobody hardly knows anything besides the one from Verisign, you'll get different levels of support if you can't get things working. Talking about Verisign - they offer a 40 bit certificate valid for two years for $598 and a 128 bit certificate (two years as well) for $1595.... Please let me know what you think about this. Should we go for the cheapest solution ? How many bits is considered a "minimum" ? What does it take for a company to be able to issue such certificates ? What is one really guaranteed when using a https connection? Any thoughts are most welcome. Thanks in advance guys 'n' gals. /Jan Do you know why it's important to make fast decisions? Because you give yourself more time to correct your mistakes, when you find out that you made the wrong one. Chris Meech on deciding whether to go to his daughters graduation or a Neil Young concert

                  R Offline
                  R Offline
                  Rocky Moore
                  wrote on last edited by
                  #8

                  Oh yeah, I forgot to mention in the other post: http://freessl.com/[^] Rocky <>< Mozilla/Firefox Crushing IE's Lead![^]

                  1 Reply Last reply
                  0
                  • R Rocky Moore

                    Actually, you are limited to one SSL per IP. You can handle hundreds per server as long as they each have their own IP. Since the headers are encrypted, you cannot see the header to use a multi-homed server on a single IP. So, you only need to have your ISP give you a new IP address for each SSL site. Rocky <>< Mozilla/Firefox Crushing IE's Lead![^]

                    J Offline
                    J Offline
                    Jan R Hansen
                    wrote on last edited by
                    #9

                    OK - so then it should be possible to run your IIS with two IP's. One for unsecure websited differentiated per host header - and install the certificate on the other IP and use that IP for all sites that need secure connections. After decryption of the headers, the IIS would then in turn be able to differentiate on the host header again ? Websites |- site A (IP: 1.2.3.4, host header www.a.com, not secure) |- site B (IP: 1.2.3.4, host header www.b.com, not secure) |- site C (IP: 1.2.3.5, host header www.c.com, secure) |- site D (IP: 1.2.3.5, host header www.d.com, secure) Do you know why it's important to make fast decisions? Because you give yourself more time to correct your mistakes, when you find out that you made the wrong one. Chris Meech on deciding whether to go to his daughters graduation or a Neil Young concert

                    A 1 Reply Last reply
                    0
                    • J Jan R Hansen

                      OK - so then it should be possible to run your IIS with two IP's. One for unsecure websited differentiated per host header - and install the certificate on the other IP and use that IP for all sites that need secure connections. After decryption of the headers, the IIS would then in turn be able to differentiate on the host header again ? Websites |- site A (IP: 1.2.3.4, host header www.a.com, not secure) |- site B (IP: 1.2.3.4, host header www.b.com, not secure) |- site C (IP: 1.2.3.5, host header www.c.com, secure) |- site D (IP: 1.2.3.5, host header www.d.com, secure) Do you know why it's important to make fast decisions? Because you give yourself more time to correct your mistakes, when you find out that you made the wrong one. Chris Meech on deciding whether to go to his daughters graduation or a Neil Young concert

                      A Offline
                      A Offline
                      Anders Molin
                      wrote on last edited by
                      #10

                      No, only one website using SSL on each IP addr. The point is that IIS can not decrypt the headers and see the hostname before it knows which certificate to use, thats why you can only have one site per ip when suing SSL... - Anders Bill's Bar
                      My Photos

                      WDevs - The worlds first DSP, free blog space, email and more. Now also with forums :)

                      J 1 Reply Last reply
                      0
                      • A Anders Molin

                        No, only one website using SSL on each IP addr. The point is that IIS can not decrypt the headers and see the hostname before it knows which certificate to use, thats why you can only have one site per ip when suing SSL... - Anders Bill's Bar
                        My Photos

                        WDevs - The worlds first DSP, free blog space, email and more. Now also with forums :)

                        J Offline
                        J Offline
                        Jan R Hansen
                        wrote on last edited by
                        #11

                        Alright, I'm obviously not at full speed today :zzz:. I'll try again - and see if I can explain why I can't understand it :-D Anders Molin wrote: IIS can not decrypt the headers and see the hostname before it knows which certificate to use - fine. But you can get certificates that are valid for both "a.domain.com" and "b.domain.com". If both points at IP 1.2.3.4 and the IIS has installed the certificate for that particular IP address, why can't it use that certificate to decode the header and afterwards branch on the host header ? If the statement "One certificate, one IP address, one website" holds - then why can you get certificates for subdomain like "a.domain.com" / "b.domain.com" ? Btw - my collegue somehow generated a certificate (an "untrusted" one) yesterday. What is a such worth ? Is the problem that anybody could hack our DNS, redirect the site to anther server, issue a certificate claiming to be from my company and thus let the users think that every thing is OK ? Or could one claim that now the customers have an encrypted connection to the server, and as long as the above doesn't happen, things are fine... hmmm... this is qute difficult to fully understand. :) Do you know why it's important to make fast decisions? Because you give yourself more time to correct your mistakes, when you find out that you made the wrong one. Chris Meech on deciding whether to go to his daughters graduation or a Neil Young concert

                        A 1 Reply Last reply
                        0
                        • J Jan R Hansen

                          Alright, I'm obviously not at full speed today :zzz:. I'll try again - and see if I can explain why I can't understand it :-D Anders Molin wrote: IIS can not decrypt the headers and see the hostname before it knows which certificate to use - fine. But you can get certificates that are valid for both "a.domain.com" and "b.domain.com". If both points at IP 1.2.3.4 and the IIS has installed the certificate for that particular IP address, why can't it use that certificate to decode the header and afterwards branch on the host header ? If the statement "One certificate, one IP address, one website" holds - then why can you get certificates for subdomain like "a.domain.com" / "b.domain.com" ? Btw - my collegue somehow generated a certificate (an "untrusted" one) yesterday. What is a such worth ? Is the problem that anybody could hack our DNS, redirect the site to anther server, issue a certificate claiming to be from my company and thus let the users think that every thing is OK ? Or could one claim that now the customers have an encrypted connection to the server, and as long as the above doesn't happen, things are fine... hmmm... this is qute difficult to fully understand. :) Do you know why it's important to make fast decisions? Because you give yourself more time to correct your mistakes, when you find out that you made the wrong one. Chris Meech on deciding whether to go to his daughters graduation or a Neil Young concert

                          A Offline
                          A Offline
                          Anders Molin
                          wrote on last edited by
                          #12

                          Jan R Hansen wrote: If the statement "One certificate, one IP address, one website" holds - then why can you get certificates for subdomain like "a.domain.com" / "b.domain.com" ? A certificate only works for a single domain, like a.domain.com, you need a nother certificate for b.domain.com, as it's another subdomain. In order to get this to run on the same webserver, you need different ip-addresses for a and b subdomains. Jan R Hansen wrote: Btw - my collegue somehow generated a certificate (an "untrusted" one) yesterday. What is a such worth ? Yep, thats easy enough. Problem is that the browsers don't know the CA so the first time people visit yur website they are told that the certificate CA is unknown and they need to install the certificate in order to continue. Jan R Hansen wrote: Is the problem that anybody could hack our DNS, redirect the site to anther server, issue a certificate claiming to be from my company and thus let the users think that every thing is OK ? Yeah, thats one of the reasons you pay the big $$ to companies like verisign, to try to prevent this from happening (of course the user need to actually check the certificate in ordet to see if it's issued to the right company, and how many does that?) Jan R Hansen wrote: Or could one claim that now the customers have an encrypted connection to the server, and as long as the above doesn't happen, things are fine Yep, the data is encrypted just fine no matter what type of certificat you have ;) BTW, where in Denmark are you from? - Anders Bill's Bar
                          My Photos

                          WDevs - The worlds first DSP, free blog space, email and more. Now also with forums :)

                          J 1 Reply Last reply
                          0
                          • A Anders Molin

                            Jan R Hansen wrote: If the statement "One certificate, one IP address, one website" holds - then why can you get certificates for subdomain like "a.domain.com" / "b.domain.com" ? A certificate only works for a single domain, like a.domain.com, you need a nother certificate for b.domain.com, as it's another subdomain. In order to get this to run on the same webserver, you need different ip-addresses for a and b subdomains. Jan R Hansen wrote: Btw - my collegue somehow generated a certificate (an "untrusted" one) yesterday. What is a such worth ? Yep, thats easy enough. Problem is that the browsers don't know the CA so the first time people visit yur website they are told that the certificate CA is unknown and they need to install the certificate in order to continue. Jan R Hansen wrote: Is the problem that anybody could hack our DNS, redirect the site to anther server, issue a certificate claiming to be from my company and thus let the users think that every thing is OK ? Yeah, thats one of the reasons you pay the big $$ to companies like verisign, to try to prevent this from happening (of course the user need to actually check the certificate in ordet to see if it's issued to the right company, and how many does that?) Jan R Hansen wrote: Or could one claim that now the customers have an encrypted connection to the server, and as long as the above doesn't happen, things are fine Yep, the data is encrypted just fine no matter what type of certificat you have ;) BTW, where in Denmark are you from? - Anders Bill's Bar
                            My Photos

                            WDevs - The worlds first DSP, free blog space, email and more. Now also with forums :)

                            J Offline
                            J Offline
                            Jan R Hansen
                            wrote on last edited by
                            #13

                            Thanks, thanks and thanks again. I must have misunderstood something regarding having one certificate that was valid for several subdomains. We'll look into that. But now I'm beginning to understand this just a little, at least. I'm from Bagsværd. It's around 15 km north-west of Copenhagen. Currently I'm working in Birkerød which is another 10 km to the north. Why ? :-D Do you know why it's important to make fast decisions? Because you give yourself more time to correct your mistakes, when you find out that you made the wrong one. Chris Meech on deciding whether to go to his daughters graduation or a Neil Young concert

                            A 1 Reply Last reply
                            0
                            • J Jan R Hansen

                              Thanks, thanks and thanks again. I must have misunderstood something regarding having one certificate that was valid for several subdomains. We'll look into that. But now I'm beginning to understand this just a little, at least. I'm from Bagsværd. It's around 15 km north-west of Copenhagen. Currently I'm working in Birkerød which is another 10 km to the north. Why ? :-D Do you know why it's important to make fast decisions? Because you give yourself more time to correct your mistakes, when you find out that you made the wrong one. Chris Meech on deciding whether to go to his daughters graduation or a Neil Young concert

                              A Offline
                              A Offline
                              Anders Molin
                              wrote on last edited by
                              #14

                              Jan R Hansen wrote: I'm from Bagsværd. It's around 15 km north-west of Copenhagen. Currently I'm working in Birkerød which is another 10 km to the north. Why Just curious, I'm from Slangerup my self. 20 kilometers from Birkerød ;) - Anders Bill's Bar
                              My Photos

                              WDevs - The worlds first DSP, free blog space, email and more. Now also with forums :)

                              J 1 Reply Last reply
                              0
                              • A Anders Molin

                                Jan R Hansen wrote: I'm from Bagsværd. It's around 15 km north-west of Copenhagen. Currently I'm working in Birkerød which is another 10 km to the north. Why Just curious, I'm from Slangerup my self. 20 kilometers from Birkerød ;) - Anders Bill's Bar
                                My Photos

                                WDevs - The worlds first DSP, free blog space, email and more. Now also with forums :)

                                J Offline
                                J Offline
                                Jan R Hansen
                                wrote on last edited by
                                #15

                                Well, its a small world after all. Somehow I've always had the impression that you were from Sweden (no offence ;)) ehh.. no offence to the swedes either... ;P. Must be your last name. Do you know why it's important to make fast decisions? Because you give yourself more time to correct your mistakes, when you find out that you made the wrong one. Chris Meech on deciding whether to go to his daughters graduation or a Neil Young concert

                                1 Reply Last reply
                                0
                                Reply
                                • Reply as topic
                                Log in to reply
                                • Oldest to Newest
                                • Newest to Oldest
                                • Most Votes


                                • Login

                                • Don't have an account? Register

                                • Login or register to search.
                                • First post
                                  Last post
                                0
                                • Categories
                                • Recent
                                • Tags
                                • Popular
                                • World
                                • Users
                                • Groups