I'm running my own CA. My new cert's desired CSR has CN papaya. I'm looking to add some local domain structure with subjectAltName, but browsers are rejecting the added domains.
This is my openssl.cnf used for signing:
[req]
default_md = sha256
req_extensions = v3_req
[v3_req]
basicConstraints = CA:FALSE
keyUsage = nonRepudiation, keyEncipherment, dataEncipherment
extendedKeyUsage = serverAuth
subjectAltName = @alt_names
[alt_names]
DNS.1 = papaya
DNS.2 = *.papaya
DNS.3 = localhost
Connecting to https://localhost or https://whatever.papaya then makes Firefox 45 puke with
localhost uses an invalid security certificate.
The certificate is only valid for the following names: papaya, *.papaya, localhost
Error code: SSL_ERROR_BAD_CERT_DOMAIN
I'd say this is some confusing stuff, since the error message seems to indicate everything is correct. Only https://papaya works though.
To add to the confusion, on Chrome 49, https://localhost also works. Unfortunately https://whatever.papaya still does not.
I've used this exact procedure to output multiple real-world FQDN certs, but never for local single word domains, hence the confusion.
What am I missing?