One might not want to make the client side interactive to the point
where the user manages client side certs.  Of course, that can be made
automatic and predefined client certs could be embedded in the set-top
box.  Which might actually give one the advantage of knowing if the user
is really using a set-top box on your approved list or not.  

I am still confused with the original question about not wanting apache
to give the cert out.  That would be the server cert and the set-top
client only needs trusted roots to verify this cert from apache.  In
fact, this design allows one to limit the circle of trust to servers
that have certs signed by the embedded trusted root in the set-top box.

Thanks
Baber
:)

>>> [EMAIL PROTECTED] 04/18/02 09:26AM >>>
"Tobias Mattsson" <[EMAIL PROTECTED]> writes:
> Well it might not be such a good design, 
> but what I asked initially was only if it is possible to restrict
apache from giving the cert out, and if that somehow can stop people
from connecting to the server without having the certificate.
No. This violates the SSL specification.

> This is necessary since I am using a stripped SSL implementation on
> the client side that does not support client authentication (The
> clients will be Digital-TV set-top-boxes with OpenTV OS).
I'm a little puzzled by this: the additional cost of adding client
authentication TO THE CLIENT is very small. Essentially, it's being
able to transmit two additional messages. Be better just to add
client auth. Or, use passwords.

-Ekr
______________________________________________________________________
OpenSSL Project                                 http://www.openssl.org

User Support Mailing List                    [EMAIL PROTECTED]

Automated List Manager                           [EMAIL PROTECTED]
______________________________________________________________________
OpenSSL Project                                 http://www.openssl.org
User Support Mailing List                    [EMAIL PROTECTED]
Automated List Manager                           [EMAIL PROTECTED]

Reply via email to