

Here is a simple explanation of subject alternative namesġ: Should I increase the encryption from 256bit to something more significant, in preparation for browsers enforcing that? If so, what size? ) kind of putting all your eggs in one basket.

Probably because you do not want a single cert that protects 200 domains all with wildcards (*., *. Usually most external cert providers limit the amount of subject alternative names. With a subject alternative name you can create cert that is valid for both domain1 and domain2. (ie, .) without subject alternative names you would need to create 20 separate certs to protect the sites traffic. Let say you have 20 website that are all on different domain. Subject Alternative Names if used properly save you a ton of time. I preface this with I am not an authority on certificates or encryption, but I do have a decent working understanding. Browsers of late are starting to adhere to HSTS, and applications and browsers have been hard-coded to look for certificates with certain thumbprints, or certificates signed by CA's with certain thumbprints. I've most commonly (of late) seen invalid certificate notifications stemming from in-line SSL Inspection by web proxies and firewalls which operate by essentially using an MITM attack (but legitimate - because its a corporate firewall). The gotcha that I see is - why? I don't see what about this indicates you need to replace the root certificate. I host my old CA's CRL on the new CA's website and some IIS and DNS trickery, it is still available at its "old" location.Ĥ. Technically, as long as they are not revoked, and the Certificate Revocation List (CRL) is published at the CRL Distribution Point (CDP) specified in the certificate, all old certificates will still be valid until their expiration date. Well, it's complicated - there are several possible outcomes. You can add multiple names with the dns= format and optionally include an IP address using ipaddress=.ģ. But essentially, its Attribute:Value joined with a line break "\n". Text certreq -submit -attrib "CertificateTemplate:\nSAN:dns=&dns=computername&dns=&ipaddress=10.1.1.1" C:\path\to\cert.rcsr
