Twitter | Search | |
SSLMate
Buy SSL Certificates from the Command Line. Automate your renewals.
102
Tweets
0
Following
465
Followers
Tweets
SSLMate Nov 14
Introducing the new Cert Spotter: with Expiration Monitoring, Alert Fatigue Reduction, and More
Reply Retweet Like
SSLMate Nov 5
New blog post: Elizabeth Warren's Website Uses a Foreign TLD. Hopefully She's Monitoring Certificate Transparency!
Reply Retweet Like
SSLMate 1 Nov 18
Introducing Cert Spotter API 1.0 - the easiest way to programmatically list a domain's certificates, powered by :
Reply Retweet Like
SSLMate 26 Apr 18
New Blog Post: Yes, it's OK if GitHub Requests Certificates for Sub-Domains Delegated to Them (and you can now exclude delegated sub-domains from Cert Spotter monitoring)
Reply Retweet Like
SSLMate 26 Apr 18
All certificates issued through are already in compliance with the upcoming deadline. There is no need for you to take action.
Reply Retweet Like
SSLMate 12 Apr 18
Replying to @TheDaveCA @letsencrypt
Directly using LE (or any CA's API) requires doing your own key management, expiration tracking, monitoring, and challenge responses. Doable if you want, but a lot of engineering work, esp. for multi-server deployments. We have a comparison here:
Reply Retweet Like
SSLMate 11 Apr 18
Introducing SSLMate for SaaS - Get Certificates For Your Customers' Vanity Domains
Reply Retweet Like
SSLMate 7 Dec 17
How Cert Spotter Parses 255 Million Certificates:
Reply Retweet Like
SSLMate 11 Sep 17
comodo[.]com is also valid, see: This is causing so much confusion I may need to special case comodoca[.]com.
Reply Retweet Like
SSLMate 7 Sep 17
Replying to @rodehoed
Comodo supports several CAA identifiers, and comodo-dot-com is the first one they listed in their communication with Mozilla.
Reply Retweet Like
SSLMate 31 Aug 17
Replying to @EvanOH @__agwa
Thanks for pointing this out! It's fixed now.
Reply Retweet Like
SSLMate 31 Aug 17
CAA Record Helper now lists all CAs in the Mozilla program, and can auto-generate using :
Reply Retweet Like
SSLMate 8 Apr 17
SSL Pulse is tracking only 250 domains with CAA records. Let's get that number up!
Reply Retweet Like
SSLMate 25 Jan 17
We monitor all CT logs recognized by Chrome. Note that expired certs are excluded by default.
Reply Retweet Like
SSLMate 10 Nov 16
Old Chrome showing ERR_CERTIFICATE_TRANSPARENCY_REQUIRED for Symantec certs issued since June 1 (SSLMate unaffected)
Reply Retweet Like
SSLMate 7 Sep 16
Why Chrome 53 is Rejecting Chase Bank's Symantec Certificate
Reply Retweet Like
SSLMate 2 Sep 16
New blog post: "What Will Happen to WoSign? A Look at Past Certificate Authority Sanctions"
Reply Retweet Like
SSLMate 2 Sep 16
Replying to @freddyb
Thanks, that's a good idea! We will probably do this.
Reply Retweet Like
SSLMate 25 Aug 16
Replying to @SSLMate
Fun fact: 4 of the last 5 CAs to have security failures now log all certificates they issue to logs.
Reply Retweet Like
SSLMate 25 Aug 16
Cert Spotter has only been out a month, but we already have 3 new entries in our CA Hall of Shame, for WoSign&Comodo
Reply Retweet Like