> However, in a strict local configuration like my testing environment the
> concept of trust is non relevant. I'm able to consider my CA and
> certifictae
> trustfull. And so the problem is only technical.
> Basically how to complete (technical) trust between both ?

It depends upon the precise client software you are using. But pretty much
every client implementation of SSL has some way to add a CA to the list of
trusted CAs. You may also be able to bypass this security check entirely.

A certificate from an untrusted CA serves essentially no purpose over a
self-signed certificate. So you either need to configure the client to
accept a certificate that serves no purpose or configure the client to trust
the CA that issued the certificate.

How you do that depends upon the specific client. Some browsers will simply
allow you to open the CA certificate and offer you the option to trust it.
Some will give you the option to trust either the CA or the specific
certificate it issued when they present you with the "certificate from
untrusted source" error.

The right course of actions depends on exactly what you are trying to do and
what you're trying to test. My guard always goes up when people (especially
people who don't understand the basics of security) are implementating an
encryption/verification algorithm and they ask for ways to make key security
factors in the implementation useless. Of course, if you created your own CA
and did so properly, there's no reason *you* shouldn't trust it. But saying
fundamental security issues are "only technical" scares me.

DS


______________________________________________________________________
OpenSSL Project                                 http://www.openssl.org
User Support Mailing List                    openssl-users@openssl.org
Automated List Manager                           [EMAIL PROTECTED]

Reply via email to