@sheepthief:
Success!
1. Initial problems were down to me having the login page as a sub-subdomain of the wildcard domain.
2. The more interesting problem I encountered after fixing item 1, was that at the login page Opera and Safari threw up certificate warnings, whereas Firefox and IE didn't.
;) than its fine.
=> yes, thats a problem. I don't know if an "official" certificate registrar ever offers such multilevel wildcard domains (ok, CaCert.org would but that registrar ist maximum only implemented in Firefox as I know)
for complete "documentation": that is the CRL URL defined in certificates.
For instance Google:
URI: http://www.gstatic.com/GoogleInternetAuthority/GoogleInternetAuthority.crl
mmh, when I tried to get cert and ospf uri per request:
$ echo -n | openssl s_client -connect www.google.com:443 2>&1 | sed -ne '/-BEGIN CERTIFICATE-/,/-END CERTIFICATE-/p' | openssl x509 -noout -subject -issuer -ocspid -ocsp_uri
subject= /C=US/ST=California/L=Mountain View/O=Google Inc/CN=www.google.com
issuer= /C=US/O=Google Inc/CN=Google Internet Authority
there is no URL ^^… seems that OCSP ist an additionional CRL to make it more "secure" (looking ^^).
ok, other site as example... here it works:
$ echo -n | openssl s_client -connect www.amazon.de:443 2>&1 | sed -ne '/-BEGIN CERTIFICATE-/,/-END CERTIFICATE-/p' | openssl x509 -noout -subject -issuer -ocspid -ocsp_uri
subject= /C=US/ST=Washington/L=Seattle/O=Amazon.com Inc./CN=www.amazon.de
issuer= /C=US/O=VeriSign, Inc./OU=VeriSign Trust Network/OU=Terms of use at https://www.verisign.com/rpa 10/CN=VeriSign Class 3 Secure Server CA - G3
http://ocsp.verisign.com
ok, Verisign, you pay much more than at other registrars… so you also should got more out ;)
CRL than this way:
$ echo -n | openssl s_client -connect www.google.com:443 2>&1 | sed -ne '/-BEGIN CERTIFICATE-/,/-END CERTIFICATE-/p' | openssl x509 -noout -text | grep -i crl
X509v3 CRL Distribution Points:
URI:http://www.gstatic.com/GoogleInternetAuthority/GoogleInternetAuthority.crl