Re: verify client certificate at a later point

2009-09-26 Thread Victor Duchovni
On Sat, Sep 26, 2009 at 03:49:34PM +0200, Michael Prinzinger wrote: > Once I will have a first working prototype of the protocol, you will be able > to check it our here: > http://code.google.com/p/phantom/ Thanks for the offer, but I try avoid using security software written by implementers new

Re: verify client certificate at a later point

2009-09-26 Thread Michael Prinzinger
Thank You for your help! I understand now, that the client would not be able to offer a certificate unless it owns the corresponding private key. So it is enough to check that the certificate offered (or its fingerprint), matches the certificate (resp. finger print) send to the server on a secure

RE: verify client certificate at a later point

2009-09-25 Thread David Schwartz
Michael Prinzinger: > I wrote a customized "check certificate" method, that simply compares > the certificate the client offered during the connection build up, to > the certificate we know it should be using. This works fine. That works so long as you already know the certificate the client sho

Re: verify client certificate at a later point

2009-09-25 Thread Victor Duchovni
On Fri, Sep 25, 2009 at 01:49:25PM +0200, Michael Prinzinger wrote: > Dear Victor, > > thanks for your help. > The problem is that I need to understand OpenSSL and its mechanisms and No you need to understand SSL/TLS in general, and how to make use of SSL in your protocol. The OpenSSL part will

Re: verify client certificate at a later point

2009-09-25 Thread Michael S. Zick
On Fri September 25 2009, Michael Prinzinger wrote: > Dear Victor, > > thanks for your help. > The problem is that I need to understand OpenSSL and its mechanisms and > possibilities in order to find a way to implement the design of the > protocol. > It would be nice if you could help a little bit

Re: verify client certificate at a later point

2009-09-25 Thread Michael Prinzinger
Dear Victor, thanks for your help. The problem is that I need to understand OpenSSL and its mechanisms and possibilities in order to find a way to implement the design of the protocol. It would be nice if you could help a little bit further still, but I will understand if you should choose not to.

Re: verify client certificate at a later point

2009-09-24 Thread Michael Prinzinger
sorry! I mean BIO_do_connect() this function automatically checks the client verificate, so I need to overwrite the verifiction callback BIO_do_connect uses thx On Thu, Sep 24, 2009 at 5:13 PM, Michael Prinzinger wrote: > Thank You very much Victor, > > I think I understand now how it can be don

Re: verify client certificate at a later point

2009-09-24 Thread Michael Prinzinger
Thank You very much Victor, I think I understand now how it can be done. If you could give me one last pointer, how to overwrite the verification callback function, that is called when executing "BIO_do_handshake", I'd be very grateful. sorry for using misguiding vocanulary :) Michael On Thu, S

Re: verify client certificate at a later point

2009-09-24 Thread Victor Duchovni
On Thu, Sep 24, 2009 at 04:23:03PM +0200, Michael Prinzinger wrote: > > Are you saying that the accepting system expects X.509 client credentials > > from the connecting system, but that the payload (encrypted to the > > receiving node's public key) also contains the same certificate, and > > you

Re: verify client certificate at a later point

2009-09-24 Thread Michael Prinzinger
Thank You again Victor for your answer, You are right, I am not to firm with OpenSSL terminology. I tried to find some tutorials and introduction, but found relatively few, and thus tried to understand OpenSSL from looking at the man pages and the code, which makes it a little hard to get the big

Re: verify client certificate at a later point

2009-09-24 Thread Victor Duchovni
On Thu, Sep 24, 2009 at 12:00:05AM +0200, Michael Prinzinger wrote: > > "Certificates" are useless without corresponding signed messages. What > > messages are signed by the private key of the "previous" node, that the > > current node can forward to the next? > > > > I only want to verify that t

Re: verify client certificate at a later point

2009-09-24 Thread Steffen DETTMER
* Victor Duchovni wrote on Wed, Sep 23, 2009 at 16:18 -0400: > On Wed, Sep 23, 2009 at 10:04:48PM +0200, Michael Prinzinger wrote: > > > I have a somewhat curious setting (without CAs) about [...] > > > > > //check certificate > > This only verifies the server's *trust chain*, but not its > i

RE: verify client certificate at a later point

2009-09-23 Thread Ashish Thapliyal
Hope this helps. Ashish. From: owner-openssl-us...@openssl.org [mailto:owner-openssl-us...@openssl.org] On Behalf Of Michael Prinzinger Sent: Wednesday, September 23, 2009 2:02 PM To: openssl-users@openssl.org Subject: Re: verify client certificate at a later point Thank You Ashish for your answ

Re: verify client certificate at a later point

2009-09-23 Thread Michael Prinzinger
Dear Victor, On Wed, Sep 23, 2009 at 11:33 PM, Victor Duchovni < victor.ducho...@morganstanley.com> wrote: > On Wed, Sep 23, 2009 at 10:43:11PM +0200, Michael Prinzinger wrote: > > "Certificates" are useless without corresponding signed messages. What > messages are signed by the private key of t

Re: verify client certificate at a later point

2009-09-23 Thread Victor Duchovni
On Wed, Sep 23, 2009 at 10:43:11PM +0200, Michael Prinzinger wrote: > I am trying to establish a routing path for an anonymity protocol ( > http://en.wikipedia.org/wiki/Phantom_Anonymity_Protocol). > This is a one way procedure: the node that wants to be anonymized selects a > couple of other node

Re: verify client certificate at a later point

2009-09-23 Thread Michael Prinzinger
ix Online Division, 6500 > Hollister Ave, Goleta, CA 93117. V: +1 (805) 690 2908. > > > > > > > > > > > > > > *From:* owner-openssl-us...@openssl.org [mailto: > owner-openssl-us...@openssl.org] *On Behalf Of *Michael Prinzinger > *Sent:* Wednesday, September 23

Re: verify client certificate at a later point

2009-09-23 Thread Michael Prinzinger
Thank you for your answer Victor, I am trying to establish a routing path for an anonymity protocol ( http://en.wikipedia.org/wiki/Phantom_Anonymity_Protocol). This is a one way procedure: the node that wants to be anonymized selects a couple of other nodes and sends an array with setup packages (

RE: verify client certificate at a later point

2009-09-23 Thread Ashish Thapliyal
er-openssl-us...@openssl.org [mailto:owner-openssl-us...@openssl.org] On Behalf Of Michael Prinzinger Sent: Wednesday, September 23, 2009 1:05 PM To: openssl-users@openssl.org Subject: verify client certificate at a later point Dear OpenSSL group, I have a somewhat curious setting (without CAs)

Re: verify client certificate at a later point

2009-09-23 Thread Victor Duchovni
On Wed, Sep 23, 2009 at 10:04:48PM +0200, Michael Prinzinger wrote: > and let the client verify the servers certificate, like this > > X509* x509 = SSL_get_peer_certificate(s); > > CHECK(x509 != NULL); > > > > //check certificate > > long certVerifyResults = SSL_get_verify_resul

verify client certificate at a later point

2009-09-23 Thread Michael Prinzinger
Dear OpenSSL group, I have a somewhat curious setting (without CAs) about routing information along several nodes: [1] first an unkown client establishes a connection to a known server thus I set SSL_CTX_set_verify(this->ctx, SSL_VERIFY_NONE, NULL); > and let the client verify the servers c

Verify Client Certificate Error

2002-08-01 Thread Stone Shi
Title: Verify Client Certificate Error Hello all,   I installed a apache+mod_ssl+openSSL server, but it can't verify my client certificate. The server log is [01/Aug/2002 15:29:21 27838] [trace] Certificate Verification: depth: 1, subject : /CN=ChinaPay Publish System, issuer: /C=

Re: verify client certificate

2000-09-05 Thread Lutz Jaenicke
On Tue, Sep 05, 2000 at 04:28:26PM -0400, [EMAIL PROTECTED] wrote: > > thanks a lot. > > but how to sends the certificate of the CA that issued the client > certificate together with the client certificate. > and I allready used the SSL_CTX_use_certificate_chain_file(ctx,CERTF); > I used the s_

verify client certificate

2000-09-05 Thread yongw
thanks a lot. but how to sends the certificate of the CA that issued the client certificate together with the client certificate. and I allready used the SSL_CTX_use_certificate_chain_file(ctx,CERTF); I used the s_client to connect to my serevr like: OpenSSL> s_client -connect myserver:port -k

Re: verify client certificate

2000-09-05 Thread Lutz Jaenicke
On Tue, Sep 05, 2000 at 02:35:05PM -0400, [EMAIL PROTECTED] wrote: > but I got these message: > > verify error:num=20:unable to get local issuer certificate > > verify error:num=27:certificate not trusted > > verify error:num=21:unable to verify the first certificate > > How can I verify the c

verify client certificate

2000-09-05 Thread yongw
When I use verifycallback lik this: int MS_CALLBACK verify_callback(int ok, X509_STORE_CTX *ctx) { char buf[256]; X509 *err_cert; int err,depth; err_cert=X509_STORE_CTX_get_current_cert(ctx); err=X509_STORE_CTX_get_error(ctx); depth=

Failure to verify client certificate

2000-06-28 Thread Oliver King
I'm curious: the SSL server code (s3_srvr.c, line 1677) sets an error of "no certificate returned" when the client's certificate fails verification. Why use this (rather misleading) error message? The equivalent client code (s3_clnt.c, line 764) uses the more intuitive error of "certificate verify