RE: Possible to disable re-authentication?

2014-08-27 Thread Brian Hassink
Hello all, Still hoping somebody can provide input on the question below. Our software has both client and server connections, and will not request clients to re-authenticate (HelloRequest), nor initiate re-authentication to servers (ClientHello). We like to disable re-authentication such

Possible to disable re-authentication?

2014-08-22 Thread Brian Hassink
Hi, Another question for TLS/TCP and DTLS/SCTP... After initially successful authentication, is it possible to disable re-authentication such that HelloRequest/ClientHello messages are ignored? I've looked through the documentation, and tried to track down examples, but have not

Re: authentication then authorization

2008-04-10 Thread Steffen DETTMER
* Kyle Hamilton wrote on Thu, Apr 10, 2008 at 02:34 -0700: > > (That means the CA remotely signs online submitted CSRs and sends > > back a Cert immediately? Maybe such a CA would not be that > > trustworthy...) > > First: it is as trustworthy as the application seems to > require. It's not

Re: authentication then authorization

2008-04-10 Thread Kyle Hamilton
On Thu, Apr 10, 2008 at 2:00 AM, Steffen DETTMER <[EMAIL PROTECTED]> wrote: > * Kyle Hamilton wrote on Wed, Apr 09, 2008 at 14:22 -0700: > > Each peer goes through this process: > > 1) peer creates a keypair > > 2) peer generates a CSR (certificate signing request) for its public key. > > 3) pe

Re: Authentication

2005-12-02 Thread Katie Lucas
On Wed, Nov 30, 2005 at 04:44:10PM +0100, Bernhard Froehlich wrote: > As I see it it's more or less a matter of taste wether you implement > such things using certificate extenstions or use the database approach. > Some things to consider: > > - You can't modify certificate extensions, you'll h

RE: Authentication

2005-12-02 Thread Mark
Hi Bear, > > Are there any additional steps necessary to verifying the issuer > > apart from the normal peer authentication and a string compare of > > the issuer name? > > Just follow the certificate chain back to a trusted root. Anyone > can forge a certificate chain, but they won't be able t

Re: Authentication

2005-12-01 Thread Peter Sylvester
Mark wrote: Hi Bear, As I said, just remember to use some intelligence. Verify the issuer, be prepared for the case where a clueless CA issues the same serial number (which is definitely an error, but how will you handle it?), etc. Are there any additional steps necess

Re: Authentication

2005-12-01 Thread Bear Giles
Mark wrote: > Are there any additional steps necessary to verifying the issuer > apart from the normal peer authentication and a string compare of > the issuer name? Just follow the certificate chain back to a trusted root. Anyone can forge a certificate chain, but they won't be able to get back

RE: Authentication

2005-12-01 Thread Mark
Hi Bear, > As I said, just remember to use some intelligence. Verify the > issuer, be prepared for the case where a clueless CA issues the > same serial number (which is definitely an error, but how will you > handle it?), etc. Are there any additional steps necessary to verifying the issuer apa

Re: Authentication

2005-12-01 Thread Bear Giles
Mark wrote: >>No hash can be guaranteed to be unique. Issuer and serial number >>should be, but of course you need to exercise some intelligence here. > > In that case I'll use the Issuer and Serial number. Thanks. As I said, just remember to use some intelligence. Verify the issuer, be prepare

RE: Authentication

2005-12-01 Thread Mark
Hi Bear, > > I noticed a function X509_subject_name_hash(). Will that > give a unique > > reference to a certificate? It seems to ;-) > > No hash can be guaranteed to be unique. Issuer and serial number > should be, but of course you need to exercise some intelligence here. > > You can use

Re: Authentication

2005-12-01 Thread Bear Giles
Mark wrote: > I noticed a function X509_subject_name_hash(). Will that give a unique > reference to a certificate? It seems to ;-) No hash can be guaranteed to be unique. Issuer and serial number should be, but of course you need to exercise some intelligence here. You can use the subject hash

Re: Authentication

2005-12-01 Thread Peter Sylvester
I've looked at that file but my understanding is still limited. There's virtually no comments so it's hard to untangle what it is doing. I noticed a function X509_subject_name_hash(). Will that give a unique reference to a certificate? It seems to ;-) There are several calls to a functi

RE: Authentication

2005-12-01 Thread Mark
Hi Peter, > Read apps/x509.c how it parses the different ways to format a subject > and issuer. I've looked at that file but my understanding is still limited. There's virtually no comments so it's hard to untangle what it is doing. I noticed a function X509_subject_name_hash(). Will that giv

Re: Authentication

2005-12-01 Thread Peter Sylvester
etc. ==> cf apps/x509.c I must admit to being even more confused after the all the replies to this thread! Thanks for all the input ;-) I Read apps/x509.c how it parses the different ways to format a subject and issuer. -- To verify the signature, see http://edelpki.edelweb.fr/ Cela

RE: Authentication

2005-12-01 Thread Mark
Hi All, > The code below gives the FIRST Common Name RDN, not the last > one in the hierarchy > to be tested as a servername in tls. But well, if you only have one > occurrence of common name :-) > > Anyway, the WHOLE DN, i.e. all attributes together are supposed to be > unique in a CA. > Of

Re: Authentication

2005-11-30 Thread Victor Duchovni
On Wed, Nov 30, 2005 at 07:32:07PM +0100, Peter Sylvester wrote: > > C=FR;O=JANUS;CN="server1";CN=server2" > > What I mean with LAST is: The code gives server1, but what should be > compared should be server2 > AFAIK multiple CNs are not valid in the context of at least server certificates.

Re: Authentication

2005-11-30 Thread Peter Sylvester
C=FR;O=JANUS;CN="server1";CN=server2" What I mean with LAST is: The code gives server1, but what should be compared should be server2 Victor Duchovni wrote: On Wed, Nov 30, 2005 at 06:40:38PM +0100, Peter Sylvester wrote: The code below gives the FIRST Common Name RDN, not the last one

Re: Authentication

2005-11-30 Thread Victor Duchovni
On Wed, Nov 30, 2005 at 06:40:38PM +0100, Peter Sylvester wrote: > The code below gives the FIRST Common Name RDN, not the last one in the > hierarchy to be tested as a servername in tls. Yes, that is its purpose, verifying DNS names in server certificates. There is more code (not shown) that fi

Re: Authentication

2005-11-30 Thread Bear Giles
Peter Sylvester wrote: > Bear Giles wrote: >> The Common Name. You could use it as an LDAP key, convert it to a >> string and use that a key into a database, etc. >> > You probably mean the Subject DN. Yes. oops. I need to get better at proofreading. :) _

Re: Authentication

2005-11-30 Thread Peter Sylvester
The code below gives the FIRST Common Name RDN, not the last one in the hierarchy to be tested as a servername in tls. But well, if you only have one occurrence of common name :-) Anyway, the WHOLE DN, i.e. all attributes together are supposed to be unique in a CA. Of course, if your private

Re: Authentication

2005-11-30 Thread Peter Sylvester
Bear Giles wrote: Mark wrote: What feature of a certificate could I use to provide an unique key in a database table for this? How could this be extracted in a program? The Common Name. You could use it as an LDAP key, convert it to a string and use that a key into a database, etc.

Re: Authentication

2005-11-30 Thread Victor Duchovni
On Wed, Nov 30, 2005 at 04:28:04PM -, Mark wrote: > Hi Bear, > > > Mark wrote: > > > What feature of a certificate could I use to provide an unique key > > > in a database table for this? How could this be extracted in a > > > program? > > > > The Common Name. You could use it as an LDAP

RE: Authentication

2005-11-30 Thread Mark
Hi Bear, > Mark wrote: > > What feature of a certificate could I use to provide an unique key > > in a database table for this? How could this be extracted in a > > program? > > The Common Name. You could use it as an LDAP key, convert it to a > string and use that a key into a database, etc.

Re: Authentication

2005-11-30 Thread Bear Giles
Mark wrote: > What feature of a certificate could I use to provide an unique key > in a database table for this? How could this be extracted in a > program? The Common Name. You could use it as an LDAP key, convert it to a string and use that a key into a database, etc. One important nit -- you

RE: Authentication

2005-11-30 Thread Mark
Hi, Thank you Bear and Ted for your responses. > On the server side, why not maintain a database of clients and > FQDNs or IP addresses? What you gain in flexibility should more > than offset the increased complexity in the code. This is one of the options I am considering and, indeed, it does

Re: Authentication

2005-11-30 Thread Bernhard Froehlich
Mark wrote: Hi All, Thanks again to all here who helped me with my understanding of Certificates. It is likely that we would want to embed some additional data in client certificates to further enhance security. For example we may wish to include a (list of) IP address(es) that the client can

Re: Authentication

2005-11-30 Thread Bear Giles
Mark wrote: > It is likely that we would want to embed some additional data in > client certificates to further enhance security. For example we > may wish to include a (list of) IP address(es) that the client > can connect from and reject those not on the list. Alternatively > we could create a

RE: authentication system

2003-07-28 Thread Henry Su
You can generate certificate request in your server that need certificate, and transfer it to you CA machine, and sign it. Then install the certificate into your server. -Original Message-From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED]On Behalf Of Z. S.GhandSent: Saturday,

Re: Authentication fun

2000-05-11 Thread Kris Kennaway
On Wed, 10 May 2000 [EMAIL PROTECTED] wrote: > Hullo! > Just started using OpenSSL on a RH6.2 box. I configured, made, installed > with the defaults, took the stock ssh.pam file and slapped it into > /etc/pam.d/ssh however I could not authenticate. I'm using a DSA host key This is not an OpenSS

RE: authentication delegation

2000-03-23 Thread Murphy, Mike R (NL - Amsterdam)
I imagine that what we did on IIS could be scripted around s_client (but I'm not volunteering to write it!) on any server. HTH Mike Murphy > -Original Message- > From: Rich Salz [mailto:[EMAIL PROTECTED]] > Sent: donderdag 23 maart 2000 5:15 > To: [EMAIL PROTECTED] >

Re: authentication delegation

2000-03-22 Thread Rich Salz
> My question is, how's a typical authentication delegation implemented > using SSL? I can visualize a point-to-point authetication happening between > the client and ServiceA. But, how can I control access to ServiceB's > resources by ServiceA unless ServiceA is acting on behalf of a authoris