> On Mar 7, 2017, at 2:21 AM, Traiano Welcome <traiano@xxxxxxxxx> wrote: > > I have a private DNS zone hosted on AWS route 53, only resolvable from > within some specific VPCs. > It appears some applications require an SSL certificate associated with > the private DNS zone, and this SSL certificate should come from a trusted, > external certificate provider (cannot be self-signed). The "trusted external" CA that issues the not-self-signed end-entity cert can almost certainly (with appropriate configuration of the client app) be a private CA that you create and provide to the SSL clients. In which case the question below is moot. > My questions are: > > a) Is this a known use-case? i.e private dns zones requiring non-self-signed > certificates? I usually use private CA certs for use on non-public networks. > b) Since the DNS zone is not resolvable on the public internet, > how would the certificate validation process occur for applications > communicating with systems in the private zone ? There is some prior history of public CAs issuing certificates for private namespaces, but IIRC this practice is discouraged and going away. > c) Do SSL certificate providers issue trusted SSL certificates for private DNS zones? It is not really possible for them to know that the names in question are used in another "private" deployment elsewhere. -- Viktor. -- openssl-users mailing list To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-users