Skip to content

mlton.org SSL certificate uses the wrong SAN #605

Open
@Skyb0rg007

Description

@Skyb0rg007

It looks like the mlton.org website is renewing certificates via Let's Encrypt, but doing so with sf.net as the domain name. This prevents browsers from connecting to https://mlton.org.

$ openssl s_client -showcerts -servername mlton.org -connect mlton.org:443 </dev/null 2>/dev/null | openssl x509 -inform pem -noout -text
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number:
            03:c7:7f:3c:30:f9:7c:95:04:e6:96:94:57:a5:92:26:88:ed
        Signature Algorithm: ecdsa-with-SHA384
        Issuer: C = US, O = Let's Encrypt, CN = E6
        Validity
            Not Before: Jan  1 02:54:59 2025 GMT
            Not After : Apr  1 02:54:58 2025 GMT
        Subject: CN = sf.net
        Subject Public Key Info:
          <Omitted>
        X509v3 extensions:
          <Omitted>
    Signature Algorithm: ecdsa-with-SHA384
    Signature Value:
        <Omitted>

The "Subject: CN = sf.net" should be "Subject: CN = mlton.org".

Metadata

Metadata

Assignees

No one assigned

    Labels

    No labels
    No labels

    Type

    No type

    Projects

    No projects

    Milestone

    No milestone

    Relationships

    None yet

    Development

    No branches or pull requests

    Issue actions