"David Schwartz" <[EMAIL PROTECTED]> writes:

>> Hi, a question about the SSL:
>>
>> In SSL, the server certificate is checked by the
>> client as to whether the server actually holds the
>> private key of it. This is done by client sending the
>> session key signed by server's public key.
>>
>> So, why there is a need for a check of domain name in
>> the server certificate? Shouldn't the above check be
>> enough?
>
> Absolutely not. If I type "https://www.paypal.com"; and I get connected to a
> secure server run by some bad guys, knowing they own the certificate they
> present to me isn't good enough. I need to make sure the certificate was
> issued to paypal.com and signed by a certificate authority I trust.
>
> Anyone can obtain a certificate and confirm that it is their certificate. If
> the certificate is signed by a CA I trust, I then know who I am talking to.
> But knowing I am talking to someone I don't trust, and still sending them my
> credit card information, would be really stupid.

Perhaps wandering a bit off-topic, but in practice many CAs which are
trusted by most browsers will issue certificates to whomever controls
a domain at the time the cert is issued, and so there's very little
difference between trusting DNS and trusting DNS+SSL for site
authentication (though of course SSL has the advantage of encrypting
the connection).

In other words, the difference between the model Soner expected and
reality is the purchase of a certificate for a few tens of dollars
from one of the many CAs that do minimal checking before issuing
certificates.

----Scott.
______________________________________________________________________
OpenSSL Project                                 http://www.openssl.org
User Support Mailing List                    openssl-users@openssl.org
Automated List Manager                           [EMAIL PROTECTED]

Reply via email to