Hi,

Thanks for all the help everyone.

> We're signing the certificates for users. They call up the servers and
> present a certificate which authorises them. The root certificate is
> stored on the servers, and the fingerprint of it is stored in custom
> silicon (so no-one can change the entire heirarchy). This is because
> some of the systems are not online and hence can't "call home" to
> check they have the correct root CA and one concern is physical
> subversion of the CA cert stored on the server's hard drive (both the
> users and the servers are out of our physical control, in essence).
> 
> The user certificates contain a list of servers they're allowed to
> access, along with which IPs they can do it from (so that stealing a
> copy of the certificate AND the private key won't let you access a
> server illicitly).

Could you give me some examples of how this is achieved. I am still
unsure of the exact commands/parameters to use, especially when it
comes to set up the client(s).

Cheers, Mark
______________________________________________________________________
OpenSSL Project                                 http://www.openssl.org
User Support Mailing List                    openssl-users@openssl.org
Automated List Manager                           [EMAIL PROTECTED]

Reply via email to