> > > if somebody intercepts the certificate while it is in transit
> > > on the network, this person can use this certificate ?

> > If you have a certificate you can verify something that's been signed
> > with the private key, or you can encrypt something so that only the
> > holder of the private key can decrypt it.

> > You can't "do anything bad" with a certificate.  In particular, you
> > cannot sign anything with it.

> In fact I use certificate to establish a VPN, the handcheck is
> based only on the certificate.
> Thus if somebody intercepts a certificate it can use the VPN ?
> (because the VPN server accepts all connection if it knows CA
> which signed the certificate of the user)

        A certificate essentially says something like "I am Verisign, and I 
certify
that Joe Schmoe is the rightful owner of the private key whose corresponding
public key is X".

        The certificate itself is generally considered public information and 
it is
not a problem if the certificate is intercepted. If someone else presents
that certificate, it still conveys only the correct and valid information
that Joe Schmoe is the rightful owner of that key, as decided by Verisign.

        I think your question comes out of a misunderstanding of what you 
actually
*do* with a certificiate. In the example of a browser going to a secure web
site, the browser receives the certificate and does the following checks:

        1) Is the certificate valid and properly signed by a certification
authority?

        2) Do I trust that certificate authority for the purpose of 
authenticating
web sites?

        3) Is the name in the certificate actually the place I was trying to 
reach?
(If I was trying to reach "www.amazon.com", is this the name in the
certificate?)

        4) Can the machine I reached prove that it holds the corresponding 
private
key to the public key in the certificate?

        If all four questions get yes answers, then you see that little locking
icon. If the certificate is used by anyone else, they will fail test 4
unless they have the site's corresponding private key.

        The same applies to a VPN authentication operation, assuming it's 
properly
designed. Presenting the certificate is only one step. You still have to
prove that you are the party the certificate was issued to by demonstrating
possession of the private key.

        DS


______________________________________________________________________
OpenSSL Project                                 http://www.openssl.org
User Support Mailing List                    openssl-users@openssl.org
Automated List Manager                           [EMAIL PROTECTED]

Reply via email to