Hi Peter,

You mentioned:

So, when the PKI client in my (for example) web browser connects to your
IIS server, my web browser's PKI client will connect to the Certifying
Authority URL that you specified when you created your SSL certificate

what do you mean the client will connect to the CA URL specified when you created the SSL cert? I thought the client will connect to the URL specified in the "Common Name" when I created the SSL cert. I don't think I specified a URL when I create my CA... I just gave it a name in the "Common Name" field (like: "My CA" or whatever).



From: Peter O Sigurdson <[EMAIL PROTECTED]>
Reply-To: [EMAIL PROTECTED]
To: [EMAIL PROTECTED]
Subject: Re: How to check server's SSL certificate on client?
Date: Fri, 20 Aug 2004 13:04:56 -0400

Greetings,

What do I have to do to ensure that the server I connect do is the
original one?

The certificate you created with OpenSSL, like any x.509 certificate,
consists of 3 elements:
- the URL of your server
- a public key for your URL
- the URL of the certifying authority which I have to trust to believe
that your certificate is trustworthy, based on your public key

So, when the PKI client in my (for example) web browser connects to your
IIS server, my web browser's PKI client will connect to the Certifying
Authority URL that you specified when you created your SSL certificate
(which is installed on your IIS server) and will I will be challenged to
accept for installation into my web browser when I try to connect to your
server.

Then, I know that this URL is being controlled by the person whose public
key is in the certificate I installed in my browser, and I can view it to
check that public key against the listing on Verisign.com (or whoever is
your CA).

But how can I check if some hacker has redirected the request and created
a certificate with exactly the same data I used on my page?

The hacker could setup a fraudulent Domain Name Server on someone's
network segment, and write malicious mobile code to change the DNS cache
on the client computer of user X whom they wish to trick.  Then userX
would go to url www.yourrealdomain.com, which the fraudulent DNS who
direct to the hacker's own web server, and the user would see a copy of
your web site, and userX might start entering in credit card details
believing that he is buying your products.  The hacker would now have
userX's credit card number.  There is nothing you can do to stop this, so
just give up on worrying about it.

However, if your concern is that a hacker would register a closely similar
URL such as www.yourrealdomain.us, they can't possible pass themself off
as your, since the certificate with your public key is binded to url :
www.yourrealdomain.com, not www.yourrealdomain.us

I hope this explanation has been helpful , let me know if I can clarify
further.






"Clemens Chiba - Greentube I.E.S. AG" <[EMAIL PROTECTED]> Sent by: [EMAIL PROTECTED] 08/20/2004 12:34 PM Please respond to openssl-users

        To:     [EMAIL PROTECTED]
        cc:
        Subject:        {Spam?} How to check server's SSL certificate on
client?



Hi!

I've created a SSL certificate for a IIS server, and wrote a client
with OpenSSL that can communicate with this HTTPS page via POST
request.

Everything is working fine by now.

But how can I check if some hacker has redirected the request and
created a certificate with exactly the same data I used on my page?
What do I have to do to ensure that the server I connect do is the
original one?

Thanks in advance.

Ciao and bye,
   (:Clemens:)
______________________________________________________________________
OpenSSL Project                                 http://www.openssl.org
User Support Mailing List                    [EMAIL PROTECTED]
Automated List Manager                           [EMAIL PROTECTED]


_________________________________________________________________
Help STOP SPAM with the new MSN 8 and get 2 months FREE* http://join.msn.com/?page=features/junkmail


______________________________________________________________________
OpenSSL Project                                 http://www.openssl.org
User Support Mailing List                    [EMAIL PROTECTED]
Automated List Manager                           [EMAIL PROTECTED]

Reply via email to