Dear Victor,

thanks for your help.
The problem is that I need to understand OpenSSL and its mechanisms and
possibilities in order to find a way to implement the design of the
protocol.
It would be nice if you could help a little bit further still, but I will
understand if you should choose not to.

you compare the enclosed peer certificate (public key fingerprint) with the
> peer certificate (public key fingerprint) from the SSL session.
>
I wrote a customized "check certificate" method, that simply compares the
certificate the client offered during the connection build up, to the
certificate we know it should be using. This works fine.

However I think it would be more secure to be able to verify that the client
is actually in posession of the private key belonging to this certificate,
right?
The protocol design, as I should implement it, however does not speak about
signing a part of the payload with this private key; else it would be easy
for me to do.
That is why I hope to find some OpenSSL mechanism, that would allow me to do
that independent of the payload.

Thank you for your help and your time, and sorry for not yet understanding
everything perfectly.

Michael



On Thu, Sep 24, 2009 at 8:20 PM, Victor Duchovni <
victor.ducho...@morganstanley.com> wrote:

> On Thu, Sep 24, 2009 at 08:03:49PM +0200, Michael Prinzinger wrote:
>
> > Dear Victor,
> >
> > it is almost working.
> > with the cerify_callback function returning 1, I can establish a
> connection.
> > However when I call  SSL_get_verify_result()  it tells me the certificate
> is
> > not in the trust store.
>
> You don't care. Don't bother with SSL_get_verify_result() it is of
> no consequence. You need to compare the certificate *directly* against
> what you expected to receive.
>
> Or your agreement that I understood your problem is in error.
>
> I think I need to stop here. You are still asking API questions, when
> you still don't have a design and are struggling with related security
> principles.
>
> You are not yet ready to write the code. First solve the problem "on
> paper" with a design, that is written in words, not computer code
> and relates the security steps taken to the security requirements
> of the protocol and application use-case.
>
> --
>
>  /"\ ASCII RIBBON                  NOTICE: If received in error,
>  \ / CAMPAIGN     Victor Duchovni  please destroy and notify
>  X AGAINST       IT Security,     sender. Sender does not waive
>  / \ HTML MAIL    Morgan Stanley   confidentiality or privilege,
>                                   and use is prohibited.
>

Reply via email to