On 6/15/06, Dave Pawson <[EMAIL PROTECTED]> wrote:
3. Endpoint B (server/recipient of REST service)
   Registers the CA as a trusted authority (how?)
    'Has access'  to the private key of the CA (the server and CA are
    in reality one and the same organisation)

While that would be possible in theory, that's discouraged because of:

4. The client encrypts using the public key returned by the CA

5. The server decrypts using the private key.

isn't the way it should be done. Your ca person/team/machine whatever
should be as isolated from any day-to-day services you provide. One
would normally issue another certificate for the server, which in turn
is trusted by the client, because it trusts the ca. There should even
be a error saying something about encrypting (directly) to a
self-signed certs public key.

Your reference does say "The server returns the site's certificate"
which does NOT mean the site's ca certificate.

best regards,
 K. Hoercher
______________________________________________________________________
OpenSSL Project                                 http://www.openssl.org
User Support Mailing List                    openssl-users@openssl.org
Automated List Manager                           [EMAIL PROTECTED]

Reply via email to