Verifying the client certificate is only half the issue.  The other
half is deciding whether or not the holder of the cert is authorized
to access the service and with what user name(s).  

This requires more than simply checking to see if the client cert can
be validated by a CA Root cert.

> 
> Have many options, SSLTelnet for example. 
> But maybe more easy is use stunnel,  this too works fine for this case 
> (verify client certs). 
> 
> regards,
> 
> ./nelson -murilo
> 
> 
>  > Hi all ssl-ers.
>  > =20
>  > Questions.
>  > =20
>  > Anybody knows how to configure telnetd-ssl for authenticate by client =
>  > certificate ?
>  > =20
>  > Anybody knows the handshake process flow on this case ?
>  > =20
>  > When telnetd-ssl has to verify certs of telnet-ssl (client) where does =
>  > it searchs CA cert and key ?=20
>  > =20
>  > Anybody have a problem to understand the configuration of telnetd-ssl ? =
>  > On Debian linux ? S:-(
>  > =20
>  > Zanx.
>  > =20
>  > Manuel Guerrero Martos
>  > IN3 S.A.L.
>  > C/ Prim, 16 A - Bajo
>  > 12003 Castell=F3n
>  > 964723680
>  > [EMAIL PROTECTED]
>  > www.in3.es
>  > =20
>  
>  
> ______________________________________________________________________
> OpenSSL Project                                 http://www.openssl.org
> User Support Mailing List                    [EMAIL PROTECTED]
> Automated List Manager                           [EMAIL PROTECTED]
> 



 Jeffrey Altman * Sr.Software Designer     Kermit 95 2.0 GUI available now!!!
 The Kermit Project @ Columbia University  SSH, Secure Telnet, Secure FTP, HTTP
 http://www.kermit-project.org/            Secured with MIT Kerberos, SRP, and 
 [EMAIL PROTECTED]               OpenSSL.
______________________________________________________________________
OpenSSL Project                                 http://www.openssl.org
User Support Mailing List                    [EMAIL PROTECTED]
Automated List Manager                           [EMAIL PROTECTED]

Reply via email to