New on LowEndTalk? Please Register and read our Community Rules.
All new Registrations are manually reviewed and approved, so a short delay after registration may occur before your account becomes active.
All new Registrations are manually reviewed and approved, so a short delay after registration may occur before your account becomes active.
Comments
Even at that, how? The cheapest I've ever seen is StartSSL at $60.
Our reseller cost for AlphaSSL Wildcard is $37, we sell them for $42.
@Damian how much does an EV SSL cert cost for you as a reseller
$359/year
That is really expensive
Indeedy, that's why we didn't bother to put them on our site
This is why we will be moving all functions that you need into WHMCS. You shouldn't need to login to two places anyway.
Well here we go, for the SSL lovers, had this off for a while... https://catalysthost.com
It's all about cosmetic appeal, might as well make it glow :P
+1
Get yourself an PositiveSSL and enjoy.
https://my.stormvz.com/cart.php?gid=9¤cy=2
I have experience that some vps hosts are very cheap and lazy but what can you expect for one dollar a month?
https://my.stormvz.com/cart.php?gid=9¤cy=2
Can get it 5 cents cheaper at namecheap :P
@kbeezie It's $9/1 year, if you buy multiple years it gets cheaper
Comodo PositiveSSL Pricing
1 Year $9.00/yr
2 Years $8.95/yr
3 Years $8.95/yr
4 Years $8.45/yr
5 Years $7.95/yr
(Namecheap)
Already did this on one of our brands but it is still undergoing testing there.
Figures, they pulled a hostgator/godaddy there on the face-price.
Well least I still have 11 unused "free" certs which are no longer free (but can be activated for a domain for 1.99), just don't really have any use for em right now.
@mpkossen - what is name of lazy hosting provider?
@StormVZ said: Get yourself an PositiveSSL and enjoy.
https://my.stormvz.com/cart.php?gid=9¤cy=2
http://www.gogetssl.com/comodo-ssl-certificates/comodo-positive-ssl/
Wow that is cheap.
I see $1.99 Comodo SSL with a new domain at cheapname.com
https://www.ssllabs.com/ssltest/analyze.html?d=catalysthost.com
Don't just implement SSL for the green address bar, implement it well!
(You're not the only one with badly implemented SSL, not trying to single you out)
Actually we just moved the site about 24 hours ago, put it on a little faster network, new setup though. Thanks for that tip, added to tonight's to-do list
Don't just implement SSL for the green address bar, implement it well!
Is mine (running on nginx) : https://www.ssllabs.com/ssltest/analyze.html?d=ionvz.com
Though Not sure about the order, I put the keys in the order specified by PositiveSSL
Far as the Beast Attack vulnerability, seems the only 'fixes' are beta versions of OpenSSL... normally you don't want to be running beta on production.
https://www.ssllabs.com/ssltest/analyze.html?d=catalysthost.com
Little better for now.
Same, got rid of all the vulnerabilities (BEAST, compression, etc), now my only 'warning' appears to be incorrect chain order.
https://www.ssllabs.com/ssltest/analyze.html?d=ionvz.com
Edit: No chain issue anymore either, removed the old intermediate cert from the chain.
cat ssl.crt PositiveSSLCA2.crt AddTrustExternalCARoot.crt > chained.crt
Here's mine:
https://www.ssllabs.com/ssltest/analyze.html?d=signatureo.us
Haven't really tweaked much in nginx
I noticed too.
https://www.ssllabs.com/ssltest/analyze.html?d=signatureo.us
Haven't really tweaked much in nginx
Wasn't anything to do with nginx, was just I had an old style intermediate cert included along with the root and main.
the TLS 1.1/1.2 support of course is going to rely on OpenSSL support, and nginx only uses OpenSSL.
My ssltest wasn't related to your post, the cat command (correct order) was
Some people don't realize, HTTPS works fine without a certificate. They just need to enable it on the master server.
Well not much of a boost (from 85 to 91), but I installed OpenSSL from /usr/ports/security/openssl, as opposed to the default one FreeBSD uses, and it increased the score and added TLS 1.1 and 1.2 support.
Also added on stronger cyphers with RC4 prioritized.
ssl_ciphers ECDHE-RSA-AES128-SHA256:AES128-GCM-SHA256:RC4:HIGH:!aNULL:!MD5:!kEDH;
And set it to use only TLS protocols (with SSLv3 included score was 90):
ssl_protocols TLSv1 TLSv1.1 TLSv1.2;
https://www.ssllabs.com/ssltest/analyze.html?d=ionvz.com