At 05:17 PM 8/24/01 +0200, you wrote:
>     Just verify the signature of request with : openssl -req -verify -in
>requestfile

Thank-you, but I made a mistake asking the question.

What you are suggesting will detect a modified request (which is what I 
wrote), but not someone substituting a different certificate request (that 
is signed consistently, but is the wrong certificate completely).

What I should have asked is how to detect a *substitute* request.  It will 
be self-consistent, but will not match the correct private key.

One solution is to show that the certificate and private key are consistent 
after signing, but there does not seem to be a way of doing this using openssl.

For example, Alice generates a request, sending it to Bob.  Mallory 
intercepts the message and substitutes a different request.  Bob sign's 
Mallory's request and returns it to Alice.  Alice thinks she has a 
certificate that matches her key and distributes it.  Mallory then sends 
data in Alice's name and people verify it against what is apparently 
Alice's certificate.

That scenario isn't exactly what I'm worried about, but it illustrates the 
problem.

Thanks again,
Andrew

______________________________________________________________________
OpenSSL Project                                 http://www.openssl.org
User Support Mailing List                    [EMAIL PROTECTED]
Automated List Manager                           [EMAIL PROTECTED]

Reply via email to