• thirteene@lemmy.world
    link
    fedilink
    English
    arrow-up
    3
    ·
    11 hours ago

    Mostly customer provided certs, high end clients make all kinds of stupid requests like the aforementioned man-in-the-middle chain sniffers, clients that refuse DNS validation, clients that require alternate domains to be updated regularly. Management is fine for mywebsite.com, but how are you solving an EV on the spoofed root prod domain, with an sso cert chain for lower environments on internal traffic that is originally provided by a client? And do you want the cs reps emailing each other your root cert and (mistakingly) the key? I’ve been given since SCARY keys by clueless support engineers. I don’t want to do this every 3 months.

    • sugar_in_your_tea
      link
      fedilink
      English
      arrow-up
      2
      ·
      10 hours ago

      Sounds like a change in company policy, because AFAIK, there’s no good reason for pretty much any of that.

      • thirteene@lemmy.world
        link
        fedilink
        English
        arrow-up
        2
        ·
        9 hours ago

        Sounds like you don’t do contact negotiations, if someone will pay 2 million to appear on their root domain, you’ll sit down and figure it out for a couple hours.