←back to thread

314 points Bogdanp | 2 comments | | HN request time: 0.453s | source
Show context
msgodel ◴[] No.44380911[source]
This is incredibly dumb. The three way handshake and initial key exchange is your certificate.
replies(2): >>44381814 #>>44382226 #
cpburns2009 ◴[] No.44381814[source]
That would be fine if browsers didn't throw up giant warning signs when using self-signed certificates.
replies(2): >>44382565 #>>44383358 #
1. nijave ◴[] No.44383358[source]
Usually you can just import the leaf self signed cert as a CA in your OS trust store and the problem goes away (assuming it has an IP SAN). Slightly tedious but you can issue the certs with long validity
replies(1): >>44389987 #
2. cpburns2009 ◴[] No.44389987[source]
Chrome provides no simple way to trust a self-signed cert. When you go to certificate details, the only option under the "Details" tab is "Export...". The only work around is to click "Advanced" and "Proceed to example.com (unsafe)". Chrome will then helpfully suffer amnesia in 1-3 days and completely forget you want to allow an exception for the certificate.