Shaun Lipscombe wrote:

<>[...]
One last question... it's to do with client certificates. If I have two
websites, say, and they both require client certificates signed by the
CA "ABC. Ltd" there is nothing stopping a client certificate being used
for authorization to access both sites even though those two sites may
not be aware of each other. Is it up to the webserver to go through the
certificate, once its been shown as being valid, and seeing whether
access should be granted or is there something I've missed. I created
two sites that have a CA "in common" in its acceptable CA list and I can
now access both sites with the same certificate. What can I do to avoid
such a circumstance?

You should not mix up the fact "The user has a valid certificate" and "The user has access to something".
If you trust a CA it implies that you trust it insofar that it only signs a certificate request containing the CN "Charlie Brown" if it is sure that the request was indeed submitted by the correct "Charlie Brown".

Or to give you another example, this mail should contain a valid signature of "Bernhard Froehlich", certified by Thawte. So you can be reasonably sure that I indeed own an official document stating that I'm really "Bernhard Froehlich". It does not say that I have any knowledge of OpenSSL or something... ;)

It's your job to configure your webserver so that someone with a correct certificate for "Charlie Brown" does have access and someone presenting a valid certificate for "Evil Guy" has not. This admittedly is not so simple most of the time, but is a problem of the webserver, and not of SSL. If you wand to go deeper in that subject please contact me directly.

<>Shaun
[...]

Kind regards, Ted ;)

--
PGP Public Key Information
Download complete Key from http://www.convey.de/ted/tedkey_convey.asc
Key fingerprint = 31B0 E029 BCF9 6605 DAC1  B2E1 0CC8 70F4 7AFB 8D26


Attachment: smime.p7s
Description: S/MIME Cryptographic Signature

Reply via email to