Hi
 
1.  client connect to server and sends list of algo and random number.
 
    question #1 Openssl.cnf points to the random seed file that openssl used to create a random number
                      (when it created the selfsigned cert) is this the same random number that we use for
                        the handshake with server? I know stupid Q but could someone answer it.
 
2.  server send back cipher name, random number and cert containing servers public key.
 
        question #2  is this the random number used to create the servers public and private keys?  If so, it could be
                           around for a long time, should it be encrypted also?
 
3.  client verifies cert, extract public key creates pre master secret encrypted with servers public key sent
        it back to the server.
 
        question #3 verifying cert means compare the host(www.authorize.net) with the cn of the server cert?  If so what's
                          going on behind the screen?
 
4.  client & server compute the encryption and MAC from pre master secret & client/server random number.
 
    question #4  write_ssl() encrypt our data with this encryption, before sending to server?
 
    question #5  when is the MAC sent and how often when I use write_ssl()?
 
    question #6  From the servers point of view, how does it verify my selfsigned cert?  When I initiate the handshake
                       I am connecting to a domain and port.  Can the server verify that its my domain from the socket
                        connection? maybe doing a reverse lookup?
 
Robert

Reply via email to