Re: Learning the basics.

2006-06-17 Thread M. Fioretti
On Sat, Jun 17, 2006 14:20:07 PM -0400, Wes Kussmaul ([EMAIL PROTECTED]) wrote: > First, the self signed root certificates included in every machine > generally don't represent any duly constituted public > authority... There is only one source of duly constituted public > authority that I know of

Re: Learning the basics.

2006-06-17 Thread Wes Kussmaul
Even if your browser was personally installed by the Pope, you still have the same problem. First, the self signed root certificates included in every machine generally don't represent any duly constituted public authority. They're typically the product of companies that can be bought and sold

Re: Learning the basics.

2006-06-17 Thread K. Hoercher
On 6/15/06, Dave Pawson <[EMAIL PROTECTED]> wrote: 3. Endpoint B (server/recipient of REST service) Registers the CA as a trusted authority (how?) 'Has access' to the private key of the CA (the server and CA are in reality one and the same organisation) While that would be possible

Re: Learning the basics.

2006-06-17 Thread Alain Damiral
"Registers the CA as a trusted authority (how?)" Yes, that is the entry point into the trust model. A client can only trust you as much as he trusts the way he got the certificate of the CA that certified you. So private meetings and USB sticks are usually a decent way to go I believe. This

Learning the basics.

2006-06-17 Thread Dave Pawson
I'm trying to get my head round a basic setup. I want to use ssl between a java client and IIS server, I'm happy with a self certification system, i.e. not using Thawte etc. since it is currently only a two terminal setup. From what I've read to date, openssl seems to fit the bill. I hope so.