> Please check this url:
> http://developer.netscape.com/docs/manuals/security/sslin/contents.htm
> Server authentication, step 4
> The only difference is that netscape just check domain name.

"Does the domain name in the server's certificate match the domain name of
the server itself? This step confirms that the server is actually located at
the same network address specified by the domain name in the server
certificate. Although step 4 is not technically part of the SSL protocol, it
provides the only protection against a form of security attack known as a
Man-in-the-Middle Attack. Clients must perform this step and must refuse to
authenticate the server or establish a connection if the domain names don't
match. If the server's actual domain name matches the domain name in the
server certificate, the client goes on to Step 5."

        As I suspected, you misunderstood it. This is NOT ABOUT DNS. This about
confirming that the server's name (the name you think you're talking to)
matches the name in the certificate.

        Suppose I trust 'www.amazom.com'. I try to connect to 'www.amazon.com' and
get 210.3.4.9. I am then a certificate for 'www.evilhost.com'. I compare the
name of the server I am trying to speak to 'www.amazon.com' to the name in
the certificate 'www.evilhost.com'. If they don't match, I refuse the
connection.

        As Netscape puts it, "does the domain name in the server's certificate"
(www.evilhost.com in my example) "match the domain name of the server
itself" (www.amazon.com in my example). In this case they don't. So the
connection is refused (or, if you prefer, considered to be to/from
'www.evilhost.com' rather than 'www.amazon.com') regardless of what DNS
says.

> Why I suppose someone can get clients' key?
> because in my case, my clients are people without computer background.
> I'd like to believe them know how to keep their keys.
> But in case keys are comprised, shouldn't we think about any possible
> solution to against it?

        I could spend months explaining why this is wrong. But I strongly advise
you that you should take the word of the security experts who advise you
that this argument makes no sense. I would cite as further evidence that you
are in no position to maintain this claim against experts the fact that you
misunderstand the basic machinations of how Netscape's server validation
works.

        I'm not trying to be mean or rude. I'm just trying to stop you from doing
something really, really bad.

        DS


______________________________________________________________________
OpenSSL Project                                 http://www.openssl.org
User Support Mailing List                    [EMAIL PROTECTED]
Automated List Manager                           [EMAIL PROTECTED]

Reply via email to