Open
Description
It looks like the mlton.org
website is renewing certificates via Let's Encrypt, but doing so with sf.net
as the domain name. This prevents browsers from connecting to https://mlton.org.
$ openssl s_client -showcerts -servername mlton.org -connect mlton.org:443 </dev/null 2>/dev/null | openssl x509 -inform pem -noout -text
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
03:c7:7f:3c:30:f9:7c:95:04:e6:96:94:57:a5:92:26:88:ed
Signature Algorithm: ecdsa-with-SHA384
Issuer: C = US, O = Let's Encrypt, CN = E6
Validity
Not Before: Jan 1 02:54:59 2025 GMT
Not After : Apr 1 02:54:58 2025 GMT
Subject: CN = sf.net
Subject Public Key Info:
<Omitted>
X509v3 extensions:
<Omitted>
Signature Algorithm: ecdsa-with-SHA384
Signature Value:
<Omitted>
The "Subject: CN = sf.net" should be "Subject: CN = mlton.org".
Metadata
Metadata
Assignees
Labels
No labels