Dear,

Le 04-déc.-06 à 19:15, Victor Duchovni a écrit :

TLS includes anonymous cipher-suites (ADH) that do not require or use
server certificates. Postfix 2.3 clients using opportunistic TLS with
Postfix 2.3 (SMTP+STARTTLS) servers will use anonymous ciphers by
default, because SMTP server authentication is not widely practiced
or practical:

        http://www.postfix.org/TLS_README.html#client_tls_limits


Le 05-déc.-06 à 00:25, David Schwartz a écrit :

If a user types in "https://site-i-trust.com"; and gets the little lock icon and no warning, he's supposed to be allowed to assume that someone he trusts
has certified that he has actually reached "site-i-trust.com".

That is not my goal of course. I don't need the user to see a lock nor want to fake anything. I wouldn't even need their url scheme to be https://. All I'm seeking is a way to have the browser engage an encrypted link with the server before sending its first query. The TLS anonymous cipher-suites Victor wrote about in the other answer to my question look like what I am looking for, but I have a doubt browsers would generally support this. I'll dig more information and program some tests.


There may be ways to solve your outer problem. The most obvious being to either obtain a certificate signed by a trusted third party or to get users
to install your certificate themself.

That would work of course, but each user-customer runs his own server (and this is no webservers meant to be accessed by the public at large) and getting a certificate for each of those from a public authority is useless because nobody tries to authenticate these servers at first, just to establish encrypted communications between those and their users. We might freely deliver them certificates signed by some root of us that we would ask them to download and install. But that introduces a dependance on us that I don't like to impose on them.

I'll probably try to find ways NOT to need encrypted HTTP at first and only upgrade to secured channel at a later stage (when protocol switch to non-HTTP).

Thanks so much (Victor and David) for these answers,

--
Olivier Mascia



______________________________________________________________________
OpenSSL Project                                 http://www.openssl.org
User Support Mailing List                    openssl-users@openssl.org
Automated List Manager                           [EMAIL PROTECTED]

Reply via email to