In message <000001c2915e$257149d0$0101a8c0@osiris> on Thu, 21 Nov 2002 14:01:45 +0100, 
"Jasper Spit" <[EMAIL PROTECTED]> said:

j.spit> For non-web based OpenSSL applications, is it still necessary
j.spit> or recommended to use certificate requests to obtain a new
j.spit> certificate ? Currently my application just creates a new X509
j.spit> certificate with X509_new(), sets things like Common Name and
j.spit> has that certificate signed by a (self-signed) CA root
j.spit> certificate. I can understand that for certificates that are
j.spit> to be signed by e.g. VeriSign you use a certificate signing
j.spit> request, but for applications like mine I don't see the need
j.spit> to use one. Maybe I'm overlooking something ?

A counter-question: why should I trust your CA?  I might trust it if
it's certified by a CA I trust, or if your EE cert is signed by a CA
that I trust...

-- 
Richard Levitte   \ Spannvägen 38, II \ [EMAIL PROTECTED]
Redakteur@Stacken  \ S-168 35  BROMMA  \ T: +46-8-26 52 47
                    \      SWEDEN       \ or +46-708-26 53 44
Procurator Odiosus Ex Infernis                -- [EMAIL PROTECTED]
Member of the OpenSSL development team: http://www.openssl.org/

Unsolicited commercial email is subject to an archival fee of $400.
See <http://www.stacken.kth.se/~levitte/mail/> for more info.

______________________________________________________________________
OpenSSL Project                                 http://www.openssl.org
User Support Mailing List                    [EMAIL PROTECTED]
Automated List Manager                           [EMAIL PROTECTED]

Reply via email to