On Sun, 7 Nov 1999, Jeffrey Altman wrote:

> > I'm just mapping public keys (which you can extract from any certificate,
> > whoever signed it) to user-ids. This mapping is stored in a SQL database
> > contaning additional data, like what services the user can use, which urls
> > (s)he can access and the like.
> > 
> > I'm using this aproach since more than 2 years (now with env. 1600 real
> > users) and it works very well.
> 
> So you are saying that I can get a Verisign certificate for me
> claiming a mail address on your system and you will let me in?

Of course, if your public key isn't in my database, you don't have any
access ;-)...

> 
> 
>     Jeffrey Altman * Sr.Software Designer * Kermit-95 for Win32 and OS/2
>                  The Kermit Project * Columbia University
>               612 West 115th St #716 * New York, NY * 10025
>   http://www.kermit-project.org/k95.html * [EMAIL PROTECTED]
> 
> 
> ______________________________________________________________________
> OpenSSL Project                                 http://www.openssl.org
> User Support Mailing List                    [EMAIL PROTECTED]
> Automated List Manager                           [EMAIL PROTECTED]
> 

______________________________________________________________________
OpenSSL Project                                 http://www.openssl.org
User Support Mailing List                    [EMAIL PROTECTED]
Automated List Manager                           [EMAIL PROTECTED]

Reply via email to