Certificate Trust status: printed source inclusion status
← Previous revision | Revision as of 23:41, 1 January 2022 | ||
Line 31: | Line 31: | ||
== Certificate Trust status ==
|
== Certificate Trust status ==
|
||
As of 2021, most browsers, email clients, and operating systems don’t automatically trust certificates issued by CAcert. Thus, users receive an “untrusted certificate” warning upon trying to view a website providing [[X.509]] certificate issued by CAcert, or view emails authenticated with CAcert certificates in [[Microsoft Outlook]], [[Mozilla Thunderbird]]. CAcert uses its own certificate on its website.
|
A disadvantage of CAcert.org is, that its root certificates are not included in the most widely deployed certificate stores.<ref>Rolf Oppliger: Secure Messaging on the Internet. Arteech House, 2014. ISBN 9781608077175 p. 171.</ref> As of 2021, most browsers, email clients, and operating systems don’t automatically trust certificates issued by CAcert. Thus, users receive an “untrusted certificate” warning upon trying to view a website providing [[X.509]] certificate issued by CAcert, or view emails authenticated with CAcert certificates in [[Microsoft Outlook]], [[Mozilla Thunderbird]]. CAcert uses its own certificate on its website.
|
||
=== Web Browsers ===
|
=== Web Browsers ===
|