|WikiProject Computing / Networking||(Rated Start-class, Low-importance)|
- 1 Cited Reference wasn't a Reference
- 2 Sometimes I forget Wikipedia isn't necessarily for the "common man"
- 3 CRL Validaton
- 4 Not Encyclopedic
- 5 pre-installation fee
- 6 >100 root certificates trusted unconditionally
- 7 Criticism
- 8 DV = junk?!
- 9 Article being vandalized with  everywhere
- 10 What's a "DN"?
- 11 "User 1" does not contain the serial number of the signing certificate
- 12 External links modified
Cited Reference wasn't a Reference
The only cited reference doesn't actually seem to have been a source for the article, as it is actually about a compromise of the mechanism, and, although it may cover some of the facts in passing, it certainly doesn't cover most of them.
I've moved it to external links.
--David Woolley 11:27, 15 November 2005 (UTC)
- I've added a line about the X.509 certificate collision, and so moved the citation back to the "References" section. — Matt <small>Crypto</small> 12:36, 15 November 2005 (UTC)
- There is still a problem that all but one paragraph lacks sources. Unfortunately, there doesn't seem to be a template for this article's references are largely incomplete. --David Woolley 12:47, 15 November 2005 (UTC).
Sometimes I forget Wikipedia isn't necessarily for the "common man"
This article was linked from another article (the latter in "common-man's" English).
But after two quick glances my eyes just glazed over.
- Thought people should be informed that the "better way" link mentioned above takes one to a commercially supported website named "webopedia.com"; "commercial" in the sense that that are numerous ads on the site. I would agree that the quality of this X.509 article needs improving - both for the "common man" as well as the computer science learner and/or practitioner. Dan Aquinas (talk) 18:11, 31 May 2012 (UTC)
In addition to the article's dependence on specific contextual background knowledge, without which it's mostly gibberish, the article suffers severely from UAD (Unexplicated Acronym Disorder) by frequently using acronyms without ever presenting what these stand for. — Preceding unsigned comment added by 22.214.171.124 (talk) 16:05, 30 September 2011 (UTC)
Much of this article is written in a casual style, especially this paragraph:
This is an example of a self-signed certificate; note that the issuer and subject are the same. There's no way to verify this certificate except by checking it against itself; we've reached the top of the certificate chain. So how does this certificate become trusted? Simple - it's manually configured. Thawte is one of the root certificate authorities recognized by both Microsoft and Netscape. This certificate comes with the web browser (you can probably find it listed as "Thawte Server CA" in the security settings); it's trusted by default. As a long-lived (note the expiration date), globally trusted certificate that can sign pretty much anything (note the lack of any constraints), its matching private key has to be one of the most closely guarded in the world.
The Certificates section suggests that large CA venders paid fee to make their root certificates pre-installed. On the other hand, a web page from the Mozilla Project clearly states no such fee. I see that pre-installation requires some kind of audit, such as WebTrust, and CA venders might pay money to the auditor. It would be great if some parts of the section is rewritten, so that readers will not get confused.Iida-yosiaki (talk) 14:11, 13 February 2009 (UTC)
>100 root certificates trusted unconditionally
How on earth did we get over 100 root certificates, all trusted unconditionally to authenticate any site whatsoever? Can someone please explain to me how https is any more secure than plain old http? Deepmath (talk) 22:35, 1 August 2009 (UTC)
Isn't authentication a job for government, rather than private enterprise? Private enterprise isn't going to authenticate anybody unless there's money in it, and their attitude is that
more money == better authentication
What if all the private driving schools in the US issued their own drivers' licenses, and for $300 extra, I could get a super-duper extended secure driver's license that proved it was actually me driving my car, and not some illegal alien? Or what if I had to renew my driver's license every year so the DMV could make more money? Deepmath (talk) 01:05, 2 August 2009 (UTC)
Article could benefit from a criticism section. The recent certificate attacks on Comodo and DigiNotar are the system showing some strain. http://dankaminsky.com/2011/08/31/notnotar/ suggests he's been criticizing the standard for years, maybe others have meaningful things to say here too. — Preceding unsigned comment added by 126.96.36.199 (talk) 12:08, 1 September 2011 (UTC)
DV = junk?!
Why do you say dv certs are junk certs? EV is the same, just more expensive. Every CA can be promised and DV is the only thing that can be technically verified to ensure that the ssl connection to that given domain is not intercepted. --188.8.131.52 (talk) 05:55, 7 September 2012 (UTC)
Article being vandalized with  everywhere
What's a "DN"?
"User 1" does not contain the serial number of the signing certificate
The following text was added to "Certificate chains and cross-certification" section in 18-05-2015:
certificate "User 1" is signed by "CA1" and the corresponding private key. But there are two different certificates named "CA 1", each of which has been signed differently. "User 1" does not contain the serial number of the signing certificate, either will suffice so long as they have the correct public key.
An X.509 certificate contains its own serial number, but is not required to include the serial number of the CA certificate used to sign it. Even if it was included, the algorithm defined in RFC5280 (Chapter 6) would ignore it when validating the certificate chain. Serial numbers are used for checking CRLs, but they are not relevant for explaining the basics of certificate chains, so I think that paragraph should be removed. M. Quijada 14:20, 1 September 2015 (UTC) — Preceding unsigned comment added by Manuel.quijada.serrano (talk • contribs)
Hello fellow Wikipedians,
I have just modified 2 external links on X.509. Please take a moment to review my edit. If you have any questions, or need the bot to ignore the links, or the page altogether, please visit this simple FaQ for additional information. I made the following changes:
- Added archive http://web.archive.org/web/20130103202328/http://www.ssltools.com:80/certificate_lookup to http://www.ssltools.com/certificate_lookup
- Added archive http://web.archive.org/web/20130108010738/http://www.ssltools.com:80/manager to http://www.ssltools.com/manager
When you have finished reviewing my changes, please set the checked parameter below to true or failed to let others know (documentation at
Archived sources still need to be checked