client auth security problem?

1999-12-16 Thread Yunhong Li
>From my understanding, the client cert is transmitted in clear. When server receives the client cert, server verifies the client cert using a CA (or chained CAs), like verifying the date, signature, etc. The question I have is that whoever could intercepts the client cert could fake the client.

RE: Why it takes so much memory?

1999-12-11 Thread Yunhong Li
It is run time memmeory on BSDI 4.0.1. I did the measurement a few weeks ago. (Does the day matter :=?) My testing might not be accurate. If anyone has done the similar test, please putlish the result. Thanks. --Yunhong -Original Message- From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTE

chain cert and client auth API

1999-10-28 Thread Yunhong Li
We are writing our server using openssl-0.9.4. If I understand it correctly, here is how to do chain cert and client auth on the server side. o chain cert Put the server cert and all CAs in a single file and use "SSL_CTX_use_certificate_chain_file". The order of certs in the file is ver

How to create a cert with SGC?

1999-10-21 Thread Yunhong Li
I like to create a CA key/cert, and a end user key/cert with SGC on. And then, I need to import the CA key/cert into Communicator or Explorer, and put the end user key/cert to Apache+mod_ssl server. How do I create the certs with SGC on and import the CA cert to a browser using openssl-0.9.4? T

RE: Confused

1999-09-08 Thread Yunhong Li
I got the same problem with version 0.9.4. 'apps/x509.c' tries to read 'client.csr' as a certificate, not a certificate request. But, 'client.csr' is a certificate request. I believe the cmd should be: "openssl x509 -req -in client.csr ..." Meanwhile, I got another question. Is it possible to g

A bug in SSLv3 when session id reuse?

1999-08-19 Thread Yunhong Li
I downloaded openssl-0.9.4, configured the target to bsdi-elf-gcc and compiled on my BSDI-4.0 machine. The performance from "s_time" in "app/openssl" is extremely slow when session id is reused. Here is how I run the command: openssl s_server -port -cert server.pem -www -ssl3