Michael Prinzinger:

> I wrote a customized "check certificate" method, that simply compares
> the certificate the client offered during the connection build up, to
> the certificate we know it should be using. This works fine.

That works so long as you already know the certificate the client should be
using.

> However I think it would be more secure to be able to verify that the
> client is actually in posession of the private key belonging to this
> certificate, right?

You wouldn't be verifying the certificate unless the client has already
authenticated with it.

> The protocol design, as I should implement it, however does not speak
> about signing a part of the payload with this private key; else it
> would be easy for me to do.
> That is why I hope to find some OpenSSL mechanism, that would allow
> me to do that independent of the payload.

If you're verifying a client certificate's validity, it would only be
because the client has already authenticated with that certificate.
Authentication with a certificate requires the private key.

DS


______________________________________________________________________
OpenSSL Project                                 http://www.openssl.org
User Support Mailing List                    openssl-users@openssl.org
Automated List Manager                           majord...@openssl.org

Reply via email to