"Parse error reading JWS"

Hm, ok.. I'm not sure why tho. As far as I can tell, the baseline requirements always mention a private key in combination with the corresponding public key in a certificate. So I don't think CAs are mandated to do this. Anyone can issue a certificate for a randomly found private key. It's only when the CA is attended on the fact a certificate was issued with a compromised key, the CA has to act.

Also, you might want to doublecheck the private keys in the Boulder repository in that case. test-ee.key was still functional (now revoked). Maybe others are too. Everything from /test/ with "key" in its name is now revoked. :slight_smile:

I wouldn't dare provoking the LE staff obviously :slight_smile: No need to get dramatic/threaten me.. :confused:

Getting a little bit offtopic now however..

5 Likes