>  A certificate essentially says something like "I am Verisign, and I certify
> that Joe Schmoe is the rightful owner of the private key whose corresponding
> public key is X".
> 
>  The certificate itself is generally considered public information and it is
> not a problem if the certificate is intercepted. If someone else presents
> that certificate, it still conveys only the correct and valid information
> that Joe Schmoe is the rightful owner of that key, as decided by Verisign.
> 
>  I think your question comes out of a misunderstanding of what you actually
> *do* with a certificiate. In the example of a browser going to a secure web
> site, the browser receives the certificate and does the following checks:
> 
>  1) Is the certificate valid and properly signed by a certification
> authority?
> 
>  2) Do I trust that certificate authority for the purpose of authenticating
> web sites?
> 
>  3) Is the name in the certificate actually the place I was trying to reach?
> (If I was trying to reach "www.amazon.com", is this the name in the
> certificate?)
> 
>  4) Can the machine I reached prove that it holds the corresponding private
> key to the public key in the certificate?
> 
>  If all four questions get yes answers, then you see that little locking
> icon. If the certificate is used by anyone else, they will fail test 4
> unless they have the site's corresponding private key.
> 
>  The same applies to a VPN authentication operation, assuming it's properly
> designed. Presenting the certificate is only one step. You still have to
> prove that you are the party the certificate was issued to by demonstrating
> possession of the private key.

Ok, so if it is not a problem if the cetifiacte is intercepted, how to "prove 
that you are the party the certificate was issued to by demonstrating 
possession of the private key " ?
Is it a special configuration the VPN ?

thx
david

Protek-on: CaraMail met en oeuvre un nouveau Concept de Sécurité Globale - 
www.caramail.com

Reply via email to