On 18 Apr 2002, Eric Rescorla wrote:

> Erwann ABALEA <[EMAIL PROTECTED]> writes:
> > No. The client normally performs the verification of the challenge signed
> > by the server. But it can eventually skip this verification, and go on
> > talking SSL with the server...
> No, this is incorrect most of the time (whenever you're doing static
> RSA key exchange). The client ENCRYPTS the PreMasterSecret under
> the server's public key. This necessitates knowing the public key.

Yes, that's right.
But to me it seems that enhancing access restriction using the server cert
is not a good idea. That means the server cert is a secret known only by
the trusted users. By definition, a certificate is public, so it cannot be
a secret.
And again, that's using symetric cryptosystems techniques with asymetric
algorithms. It's a bad design (tm).

-- 
Erwann ABALEA <[EMAIL PROTECTED]> - RSA PGP Key ID: 0x2D0EABD5
-----
Neuneu, moi ? Peut-être. En tout cas, je ne le fais pas exprès. Ca vient
tout seul. Des fois, un mot, même insignifiant, et ça part. Tenez, dites
pour voir un mot, au hasard je précise.
-+- C In Guide du Neuneu d'Usenet : Neuneu avoué est à demi pardonné -+-

______________________________________________________________________
OpenSSL Project                                 http://www.openssl.org
User Support Mailing List                    [EMAIL PROTECTED]
Automated List Manager                           [EMAIL PROTECTED]

Reply via email to