Our department's website uses the www
subdomain, both internally and externally. When I joined, I noticed that a lot of users tried without the www
, got an error, became confused or annoyed, until they tried with www
or someone told them to. So, I added an internal DNS entry for the parent domain pointing to our web server (which didn't exist previously), and configured our web server to listen for both.
We were using self-signed certificates then. Recently, we got externally signed ones, but, in an oversight, only for *.parent.domain
, not parent.domain
. Thus, while the experience on www
is generally smooth, when an unsuspecting user tries just https://parent.domain
, they get an error. In terms of curl
:
curl: (51) SSL: no alternative certificate subject name matches target host name 'parent.domain'
I added a redirect for HTTP requests, but the browser blocks further action for HTTPS, so the client never sees the redirect, but only a big, scary warning.
The certificates were obtained for three years, and I don't think I can justify a fresh expenditure just for this edge case. Is there anything I can do on the server-side to mitigate this?