Last modified: 2014-09-02 07:45:04 UTC

Wikimedia Bugzilla is closed!

Wikimedia migrated from Bugzilla to Phabricator. Bug reports are handled in Wikimedia Phabricator.
This static website is read-only and for historical purposes. It is not possible to log in and except for displaying bug reports and their history, links might be broken. See T42998, the corresponding Phabricator task for complete and up-to-date bug report information.
Bug 40998 - https://en.wikipedia.com and similar throw certificate warning
https://en.wikipedia.com and similar throw certificate warning
Status: NEW
Product: Wikimedia
Classification: Unclassified
SSL related (Other open bugs)
unspecified
All All
: Low normal (vote)
: ---
Assigned To: Nobody - You can work on this!
https://en.wikipedia.com
: ops
: 61228 (view as bug list)
Depends on:
Blocks:
  Show dependency treegraph
 
Reported: 2012-10-13 03:59 UTC by MZMcBride
Modified: 2014-09-02 07:45 UTC (History)
8 users (show)

See Also:
Web browser: ---
Mobile Platform: ---
Assignee Huggle Beta Tester: ---


Attachments

Description MZMcBride 2012-10-13 03:59:56 UTC
From bug 34788 comment #8:
> On a related note, if you go to .com addresses (like https://en.wikipedia.com/)
> using HTTPS protocol, before you get forwarded to the .org address, you will
> get an error message regarding the SSL key. That is because the .com addresses
> use the SSL key that is for *.wikipedia.org
Comment 1 MZMcBride 2012-10-13 04:01:05 UTC
(In reply to comment #0)
> From bug 34788 comment #8:
>> On a related note, if you go to .com addresses (like https://en.wikipedia.com/)
>> using HTTPS protocol, before you get forwarded to the .org address, you will
>> get an error message regarding the SSL key. That is because the .com addresses
>> use the SSL key that is for *.wikipedia.org

It'd be nice to know how common this is (usage stats, I guess). It's been quite some time since wikipedia.com was the primary domain. :-)
Comment 2 Matthew Flaschen 2013-08-03 08:04:16 UTC
This includes https://wikipedia.com and https://wikipedia.net
Comment 3 Daniel Zahn 2013-08-09 11:32:30 UTC
Just a matter of $$$. Do we want to pay for this? As already mentioned, needs data/analytics to make an informed decision if it's worth it to get more wildcard certs.
Comment 4 Andre Klapper 2014-02-24 10:51:28 UTC
*** Bug 61228 has been marked as a duplicate of this bug. ***
Comment 5 Seb35 2014-04-04 07:57:05 UTC
From a technical point of view, I read a best practice could be not to add too much DNS domains in one certificate because it adds these some bits of certificate description to all clients. For *.com and *.net domains it could be worth issuing them in a distinct certificate, if any.

Personally Iā€™m not convinced it is worth adding TLS on *.com or *.net since it is no more the canonical extension. And if stats are not soon available, I find it would be better to deactivate the TLS on these domains because certificate errors participate in lowering the global security by accustoming users to false positives (and this bug is currently really an error because signed and used domains mismatch, not just a self-signed certificate).
Comment 6 Tim Starling 2014-05-15 05:26:00 UTC
We could have those hosts go to a separate set of public IPs, and then refuse connections on port 443.
Comment 7 jeremyb 2014-09-02 07:45:04 UTC
(In reply to Tim Starling from comment #6)

+1

Note You need to log in before you can comment on or make changes to this bug.


Navigation
Links