On 17/06/2017 03:05 AM, Tony Harminc wrote:
It's validated the same way(s) any TLS client app (such as your desktop
browser) validates a server certificate. I'm not sure why you seem to think
this can't be done without client application program involvement.

There are 2 things that need to be validated with the certificate:
- That is is valid, i.e. has been signed by a trusted CA etc. AND

- That it belongs to the entity that the client is trying to connect to.

The description of AT-TLS says it takes control when the connection is opened, but at this point name resolution has already occurred, hasn't it?

So how does AT-TLS know who the client is trying to connect to so it can check the name in the certificate? I guess it would have to intercept name resolution and assume that later connections to a resolved IP address must match the name.

Or, maybe it is not intended for this type of general SSL connection.

I have been reading the documentation, but haven't been able to find anything about how (or whether) the name in the certificate is validated.

----------------------------------------------------------------------
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN

Reply via email to