On Fri, May 07, 1999 at 02:04:25PM +0000, Michael Ströder wrote:
  
> Hmm, but most times the client does not have OpenSSL to calculate that.
> Most times you have Netscape Communicator or something like this on the
> requester's side. I think PKIX proposes to send a master secret to the
> requester by some out-of-band-communication which is sent to the CA
> together with the certificate request.

Yes, you are right with your sentence about the PKIX-recommandation. 

On the other hand, the ca I am working for will only sign keys >= 1024 
bit for WWW-Server or for ca-purposes. So people who want to get a cert 
are urged to generate a key with programs that are not export-crippled. 
They will use for example OpenSSL. A fingerprint for a request would 
make request handling more easier for a ca and their customers compared 
to the PKIX recommandation.

> 
> > 5) New option "-chkdb" for the "ca"-application
> > 
> > Invoking "ca" with this option should check "index.txt" for expired
> > certs and mark them with an 'E' in the first column. The idea is that
> > it is possible to run "openssl ca -chkdb" periodically via a cron-job
> > and keep "index.txt" up-to-date.
> > This is important if you use
> > "index.txt" for online-checking (server-)certs via the extension
> > nsRevocationUrl.
> 
> Have a look at my Python scripts for these tasks:
> 
>  http://sites.inka.de/ms/python/pyca/.
> 
Thanks for the hint. My idea is to include as much functionality as
possible for proper ca-operation in the openssl-program. So people 
do not need any external programs/scripts.


Ciao,
      Lars          <[EMAIL PROTECTED]>
______________________________________________________________________
OpenSSL Project                                 http://www.openssl.org
User Support Mailing List                    [EMAIL PROTECTED]
Automated List Manager                           [EMAIL PROTECTED]

Reply via email to