On Thu, 2009-02-05 at 17:01 +0300, mb0 wrote:
> 1. can it be self-signed root certificate?
>
it can be either a root certificate or a certificate signed by a CA.
The certificate structure is the same, the meaning is different.

When the server receive the certificate, it has to verify it.
If it is self-signed, it must have a copy of that certificate stored
somewhere.

So, if you plan to have many clients, you should copy all their
certificates somewhere in the server storage... this does not scale.

A better approach is to create a CA, save only its certificate on the
server, and let any client have a certificate issued by that CA.


> 2. what options of openssl must i use so that Internet Explorer could 
> import it?
>
already replied.


> 3. if no client certificate is used, how SSL handshake happens? what 
> certificate/private ey is used on the client side?
> 
TLS/SSL support server authentication or mutual (i.e. client+server)
authentication.

With server only authentication, client and server agree on a pre-master
secret (which is symmetric key), then they compute and validate a master
secret, from which "application" keys are derived (for
encrypting/hmac-ing the record layer messages).

If client authentication is required, the client additionally digitally
signs (asymmetric crypto) a particular piece of data.
Almost nothing changes in the agreement of the pre-master secret.

So, if you don't use client auth, no client private key is used.

bye!
-- 
Emanuele Cesena <emanuele.ces...@gmail.com>
http://ecesena.dyndns.org

Il corpo non ha ideali

______________________________________________________________________
OpenSSL Project                                 http://www.openssl.org
User Support Mailing List                    openssl-users@openssl.org
Automated List Manager                           majord...@openssl.org

Reply via email to