> 1. Is there a way I can get rid of those certifcates at all and still
> use openssl, this would give me the advantage that I don't implement
> stuff in our software that we don't need nor use and hence cannot
> cause bugs or support problems.
I assume you wish to create a secure (but unauthenicated) channel to
your server with https and then let the admin of the server send his pwd
over this channel thereby establishing a secure and authenticated
channel between the server and the admin. To me it sounds like all you
have to do is:
1a) if writing your own client, create a root-cert and include it with
the client. Then create a server-cert signed by the pkey in the
root-cert.
1b) if using abrowser buy a server-cert from verisign (or similar).
1c) if using a browser and having few admin-clients, let them install
your own root-cert into their browser (they download it from the server
and verify the fingerprint ofband, ie compare it with a piece of paper
posted to them). (root-cert created like in 1a).
2) use openssl on the server (and in 1a on the client) - side to create
the secure but unauthenicated https channel.
3) implement the pwd system you want on the server side.
Not many certs are involved, a root-cert + a server cert for each server
to be administrated.

using anonymous https is pointless, since it jeopardizes (how do you
spell this? :-) the admin-pwds.

sorry, dont know mac-ish issues.
-- 

------------------------------------------------------
 Douglas Wikström <[EMAIL PROTECTED]>
------------------------------------------------------
 Yes, God created Man before Woman,
 but one always makes a draft before the masterpiece.
------------------------------------------------------
______________________________________________________________________
OpenSSL Project                                 http://www.openssl.org
User Support Mailing List                    [EMAIL PROTECTED]
Automated List Manager                           [EMAIL PROTECTED]

Reply via email to