Situation 1 (safe):
- Website was vulnerable to heartbleed and using a certificate not valid before 2012-10-21
- Website upgraded to an unvulnerable version of OpenSSL
- Website re-keyed and got a their certificate reissued, with with same not-valid-before date of 2012-10-21
- Today, when I inspect the site, I find it not vulnerable to heartbleed, and using a certificate with a not-valid-before date of 2012-10-21
Situation 2 (unsafe):
- Website was vulnerable to heartbleed and using a certificate not valid before 2012-10-21
- Website upgraded to an unvulnerable version of OpenSSL
- Today, when I inspect the site, I find it not vulnerable to heartbleed, and using a certificate with a not-valid-before date of 2012-10-21
As far as I understand things, these two situations are indistinguishable to me as an end user who has never visited the website in question before. What am I missing?
FYI, situation 1 is apparently the case for *.wikipedia.org. They said that's just the way Digicert reissues certificates.