Many thanks - it does help and I will try it soon.

Many thanks!

--- Bernhard Froehlich <[EMAIL PROTECTED]> wrote:

> l Burnerheimerton wrote:
> > [...]
> > Ted - many thanks for your help.  Just so I
> understand
> > correctly, I generate a private key certificate
> using
> > openssl to export it to a file that would then be
> > imported into a browser.
> >
> > I can then use that server key to encrypt data
> that
> > only those users for whom I have generated, and
> they
> > have installed, a private certificate can decrypt.
> >
> > Is that right?
> >   
> Hmm, I'm not sure if we are really talking about the
> same thing...
> A client certificate used in a browser application
> is for 
> authentication, so the server knows whom it is
> talking to. If the server 
> uses HTTPS and only accepts connections from users
> who can authenticate 
> with a certain kind of certificate (like those which
> were generated by 
> your own CA) the result is, that someone, who does
> not have a cert, 
> cannot "talk" with the server.
> Independent from a client certificate HTTPS assures
> that only the 
> current user can decrypt the data sent by the server
> to him/her.
> If I understood you right this satisfies your needs,
> although your 
> description is (technically) not exactly correct.
> 
> Back to the procedure you need.
> 
> First of all you'l have to set up a CA. One of many
> descriptions for 
> this can be found in
> http://sial.org/howto/openssl/ca/ (top hit of a 
> google search after "setup openssl ca"). Just check
> that your openssl 
> contains "nsCertType = client, email" and "keyUsage
> = nonRepudiation, 
> digitalSignature, keyEncipherment" for the
> certificates you are generating.
> 
> Certificate generation is also described there, if
> you don't find better 
> information on how to create keys and CSR 
> http://www.openssl.org/docs/apps/req.html may help
> you.
> 
> So let's assume you have set up the CA, your private
> key is in the file 
> privkey.pem and mycert.pem contains your
> certificate.
> Then the following command should generate a PKCS#12
> file mydata.p12 
> which can be imported by Mozilla and IE (I've tested
> with Firefox):
> 
> openssl pkcs12 -export -out mydata.p12 -inkey
> privkey.pem -in mycert.pem
> 
> To use the keys you'll probably also have to import
> your CA's cert into 
> the browser and trust it to identify web sites and
> mail users. Note that 
> this can be quite dangerous (from a security
> viewpoint) in a production 
> environment if your CA's private key is not properly
> secured...
> 
> Hope it helps.
> Ted
> ;)
> 
> -- 
> PGP Public Key Information
> Download complete Key from
> http://www.convey.de/ted/tedkey_convey.asc
> Key fingerprint = 31B0 E029 BCF9 6605 DAC1  B2E1
> 0CC8 70F4 7AFB 8D26
> 
> 


__________________________________________________
Do You Yahoo!?
Tired of spam?  Yahoo! Mail has the best spam protection around 
http://mail.yahoo.com 
______________________________________________________________________
OpenSSL Project                                 http://www.openssl.org
User Support Mailing List                    openssl-users@openssl.org
Automated List Manager                           [EMAIL PROTECTED]

Reply via email to