This may be slightly off-topic, so let me apologize in advance.

The SSL protocol requires that the client side (say a browser) use
appropriate crypto to read the server's certificate and verify the signature
on the transmitted public key (using the public key of a trusted 3rd party
such as Verisign).

How can the user be certain that their browser (or other SSL3 client) hasn't
been compromised -- or that they have a roque version of the client -- which
will go through the motions of authenticating the server but really not do a
proper job.  The result being that the user *thinks* he/she has established
a secure connection to the desired party, but in fact are connected to
another site.

Basically, the issue is how does one ensure (if possible!) that an internet
client is using valid methods to verify server certificates?

TIA

Harry

______________________________________________________________________
OpenSSL Project                                 http://www.openssl.org
User Support Mailing List                    [EMAIL PROTECTED]
Automated List Manager                           [EMAIL PROTECTED]

Reply via email to