There is no longer any need to install the custom root certificate provided by WolfKodi Security. Thanks to Let's Encrypt who signs our certificates, they are now automatically trusted by all major web browsers. You can now immediately connect securely to all resources located on the server Kodi's Wolf Pack (with domain name wolfkodi.dyndns.org), which includes Wolfing, simply by prepending https in front of the web address.
Try is out now: https://wolfkodi.dyndns.org
This server uses a modern elliptic curve digital signature algorithm (ECDSA) with at least 2048-bits to provide faster and more secure connections over the internet.
The root certificate provided by WolfKodi Security is no longer in use in favour of the new certificates. Those who have installed it in the past may safely remove it.
WolfKodi Security has provided a root certificate for this purpose. Download and install this certificate for your web browser and you can immediately start visiting the https version of this website. This certificate covers secure connections to all resources located on the server Kodi's Wolf Pack (with domain name wolfkodi.dyndns.org), which includes Wolfing.
This certificate ensures that the secure connection (using https) between your web browser and the server at wolfkodi.dyndns.org is safe to be established. The server at wolfkodi.dyndns.org is where Wolfing and other services reside. It uses full end-end encryption which ensures complete privacy, unlike connections that uses interceptive middle proxy servers. In other words, this certificate ensures that the connection between you and Wolfing is secure from all forms of attacks, including targeted ones and even cases where your internet connection has been compromised or intercepted.
WolfKodi Security is a private root certification authority that manages and controls the creation and signing process of its own certificates for the privacy and security of users of its own website.
Just WolfKodi himself for now as he wants to provide a means for the users of his website to enjoy fully encrypted, private, and secure connections to his website. He is also encouraging everyone to start switching over to the secure https connection when connecting to his website especially when you connect from public Wi-Fi networks.
Download Link: http://wolfkodi.dyndns.org/WolfKodiSecurityCAroot2015.crt
After installing the certificate, you can use this link to test your new certificate: https://wolfkodi.dyndns.org If your certificate is installed correctly, your browser should not warn when you try to connect to the site's secure network. On chrome, you would see a green padlock in front of the address bar. Chrome might take a while before it registers your new certificate. Exiting it from Menu > Exit a couple of times may help quicken the process.. You may want to update your bookmarks and visit the https version of the site by adding "https" in front of the url. You may also follow this link and bookmark it: https://wolfkodi.dyndns.org/wolfing/
This varies between different operating systems (OS) and web browsers. See below.
Double click to open the certificate file. At the bottom of the "General" tab, click on "Install Certificate...". Follow along the Certificate Import Wizard by clicking next. When you come to the option of chosing a certificate store, select the option to "Place all certificates in the follwing store" and then click on the Browse... button and select "Trusted Root Certification Authorites", then click Ok. Proceed on with Next and then Finish and you will be presented with a Security Warning where you can verify the SHA1 thumbprint of the certificate with the one listed under Certificate Details > Certificate Fingerprint below. If they match click "Yes" and it should tell you that the certificate has been successfully installed.
Launch Firefox and go to Menu and bring up the Options window. Select on the Advanced tab and select the Certificates tab then click on "View Certificates". In the Certificate Manager window, switch to the Authorities tab and click the "Import..." button. Find the saved certificate file on the hard disk and click the "Open" button. In the Downloading Certificate window, click on the "View" button at the bottom to view the details of the certificate and verify the SHA1 fingerprint when the one provided under Certificate Details > Certificate Fingerprint below. If they match, close the certificate details window and check the first checkbox that says "Trust this CA to identify web sites." and click OK. Continue clicking OK until you exit out of the Options window.
For Ice Cream Sandwich and above. Download the certificate and once its done, tap on the completed download status in the notification to open it. You will be provided with an option to name the certificate. Leave "Credential use" as "VPN and apps" and click on OK to install it. For those on KitKat and above, you will receive a scary warning to check trusted credentials. Following that suggestion will lead you to the user installed certificates page where you can tap on them and scroll down the security certificate details and verify its SHA1 fingerprint with the one provided under Certificate Details > Certificate Fingerprint below. You will have to swipe the warning in the notification list away to remove it. If you do not current use a phone screen lock, you will also be forced to do so.
More information needed. Those who have please kindly contribute.
More information needed. Those who have please kindly contribute.
A certification authority is an entity that verifies that a secure (https) website you are trying to connect to are actually who they claim to be and not someone trying to spoof and intercept your secure connection. They perform this by signing and producing digital certificates that automatically get distributed to your devices and web browsers. With these certificates, web browsers can ensure that a secure connection to a website is safe and warn you if something is wrong.
Certificates that automatically get included to your devices come from publicly recognised commercial CAs. Allowing any of these enterprise CAs to sign for us would have made the process eaiser for users. However there is both a domain ownership verification process as well as a recurring fee involved. Both of which are not sustainable as these entities are highly commercialised.
This is both a very good question as well as and important step to take. When you install the certificate, please ensure that its SHA1-generated fingerprint matches the one given below in section Certificate Details > Certificate Fingerprint. This will ensure that you have received a genuine copy of the certificate. WolfKodi Security gives you its assurance that it would only certify and validate certificates and domain names that are intended for its own use. Its certificate assures you that the connection you make to its own server is secure.
Note that the letters are not case sensitive as these values are in hexidecimal. The colons (:) and dashes (-) only serve as a guide for easier reading and they are not required to match.
SHA1 Fingerprint:
SHA256 Fingerprint:
Friendly Name: WolfKodi Security Root CA
Description: Trusted root certificate from the certification authority behind server Kodi's Wolf Pack and Wolfing.
Type: Root (In a chain of certificates, a root certificate sits right at the top of the certificate hierarchy.)
Validity Period: From 13th May 2015 until 5th May 2045
Public Key: RSA 4096-bits
Signature Algorithm: sha256WithRSAEncryption
Issuer: WolfKodi Security
Serial Number: 00 DE 98 DC 15 53 9B 8C 0B
Your web browser will present you with a warning that the secure connection you are trying to establish might not be private. This is because without the certificate, your browser is unable to verify the identity of the connection, to prevent against man-in-the-middle attacks.