Erwann ABALEA wrote:

>But to me it seems that enhancing access restriction using the server cert
>is not a good idea. That means the server cert is a secret known only by
>the trusted users. By definition, a certificate is public, so it cannot be
>a secret.
>  
>
Basically, this means that the client is truly doing password based 
authentification, and that the password is the certificate of the server.

Not going into that and doing standard user/password authentification 
will be a lot simpler, and more secure as each user will be able to have 
his own password.
Shared password is about the worst you can imagine in security.

That's what I meant by "even if you manage to do it, it won't bring 
anything more than the above solution".
And we still haven't proved it's feasable, this would mean modifying the 
SSL stack of the client so that it accepts a connexion without receving 
the certificate of the server, and use instead a copy of the certificate 
from somewhere else to continue the transaction.
No standard SSL stack will be able to do that, if modifying the stack 
for this is possible, you could as well modify it to do proper user 
certificate authentification.


______________________________________________________________________
OpenSSL Project                                 http://www.openssl.org
User Support Mailing List                    [EMAIL PROTECTED]
Automated List Manager                           [EMAIL PROTECTED]

Reply via email to