Tag: rsa

Test #31 :: Hybrid certificate (RSA CA, EC client)

This test is similar to test 30 but in this case it’s the opposite. This is the grand old untrustworthy TLS-O-MATIC CA with the old RSA keys, but a new client that use modern cool elliptic curve technology. The curve used in this certificate is named secp256r1 and is a commonly supported curve.   This test should […]

Test #30 :: Introducing Elliptic Curve Cryptography

Elliptic curve cryptography is the new black in the TLS world. It’s an alternative to the rather old RSA crypto system that is common in the web today. In this test, we are adding a new certificate authority that is based on EC keys. There are many different curves offered, so the client and server […]

Test #1 :: Setting things up, unknown certificate authority

TLS-O-Matic use our own certificate authority – not any commercial certificates. This is just for testing. You can read more about our certificate and how to install it here. In this test, we’ll use the CA that is based on a RSA key pair – one private key and one public key. The public key is embedded […]

The TLS-O-Matic no guarantee CA

CA Policy and Practise Statement WARNING – these certificates are totally insecure and are for test purposes only. All the tests are created to facilitate interoperability and application testing, but this is not a CA to trust for anything else than testing. We guarantee nothing. We promise nothing. Basically you are on your own. Make sure you remove the […]

Test #2 :: Bad hostname in certificate

Test 2 is on this URL. Please notice the port number!   https://test2.tls-o-matic.com:402 At this point, you need the TLS-o-matic certificate in your CA list on the system you are testing from. FAIL: This test should fail due to a bad host name in the certificate   When accessing a TLS server, the client has […]