Hello Patrick,

Thanks for the detailed information.

Regards
Alok Bhatnagar


----- Original Message -----
From: "Patrick Patterson" <[EMAIL PROTECTED]>
To: <openssl-users@openssl.org>
Sent: Friday, June 20, 2008 7:26 PM
Subject: Re: Server Authentication


> Hi Alok;
>
> On June 20, 2008 09:02:15 am AlokBhatnagar wrote:
> > Thanks david,
> >
> > I know that the domain name should be same as the common name in server
> > certificate which is sent by the server to the client.
> >
> > As I know, The SSL client verifies the server's certificate against the
CA
> > certificate loaded in the client.
> >
> > Suppose i trust Verisign CA. So my client must have Verisign CA
Certificate
> > in order to verify the server's certificate.
> >
>
> That is correct.
>
> > So i want to ask, how will i get the CA certificate or list of CA
> > certificates that i trust?
> >
> That depends on what your environment is - if you have fairly low security
> requirements, then just download the certificate from the Verisign web
site.
> If you have more elaborate security requirements, then you need to talk to
> Verisign, and go through one of their protocols to validate that the Trust
> Anchor that you download or receive from them is really the one that you
wish
> to trust, and that it is fully correct.
>
> Be very careful doing certificate validation - it isn't as straight
forward
> as "is this cert signed by a CA that I trust" - there's also revocation
> checking, policy matching, and many other tests that *SHOULD* be
performed,
> only some of which are provided by the OpenSSL verify functionality. For a
> full description of Path Validation and Discovery, take a look at RFC3280
(or
> 5280 if you want to be REALLY up to date)
>
> It all depends on your security requirements though - what is your risk
> profile? (Essentially - why are you even using SSL? Hide the data in
transit?
> Are you worried about man in the middle attacks? Who is on your list of
> potential attackers? What is the value of the data that you are
protecting?)
>
> The answers to these questions will determine the level and complexity of
> checking you do - if all you are doing is trying to make casual
evesdropping
> on the conversation between two IRC participants more difficult, then
perhaps
> just checking the CA identity is enough... if you are concerned with
> protecting a multi-million dollar transaction, perhaps you should be being
a
> bit more thorough :)
>
> Have fun!
>
> Patrick.
>
>
> > Thanks
> >
> > Regards
> > Alok Bhatnagar
> >
> >
> > ----- Original Message -----
> > From: "David Schwartz" <[EMAIL PROTECTED]>
> > To: <openssl-users@openssl.org>
> > Sent: Friday, June 20, 2008 6:03 PM
> > Subject: RE: Server Authentication
> >
> > > > So i want to know how will my client authenticate the server
> > > > since i don't have the server's root certificate?
> > > >
> > > > Thanks in Advance..
> > > >
> > > > Regards
> > > > Alok Bhatnagar
> > >
> > > That is completely application-dependent. The answer will depend on
what
> > > makes the legitimate server different from an imposter.
> > >
> > > Your question is basically, "how can I detect an impostor?". And the
> >
> > answer
> >
> > > is "as opposed to what?". For example, if the question is, "how can I
> > > tell the real amazon.com from an impostor who doesn't control that
> > > domain?" the answer is to see if the server presents a certificate
with
> > > 'amazon.com' in the common name that is signed by a CA you trust.
> > >
> > > If you don't know what CAs you trust, then you have a problem.
> > >
> > > DS
> > >
> > >
> > > ______________________________________________________________________
> > > OpenSSL Project                                 http://www.openssl.org
> > > User Support Mailing List                    openssl-users@openssl.org
> > > Automated List Manager                           [EMAIL PROTECTED]
> >
> > ______________________________________________________________________
> > OpenSSL Project                                 http://www.openssl.org
> > User Support Mailing List                    openssl-users@openssl.org
> > Automated List Manager                           [EMAIL PROTECTED]
>
>
>
> --
> Patrick Patterson
> President and Chief PKI Architect,
> Carillon Information Security Inc.
> http://www.carillon.ca
> ______________________________________________________________________
> OpenSSL Project                                 http://www.openssl.org
> User Support Mailing List                    openssl-users@openssl.org
> Automated List Manager                           [EMAIL PROTECTED]
>
>


______________________________________________________________________
OpenSSL Project                                 http://www.openssl.org
User Support Mailing List                    openssl-users@openssl.org
Automated List Manager                           [EMAIL PROTECTED]

Reply via email to