> How can I make the new node (A) send an encrypted request to the
> already existing node (B) while node A does not have any public
> key/certificate information about the already existing node (B), and
> still make sure that I am actually talking to B, and not some
> Man-In-The-Middle ?
>
> Thanks a bunch for any thoughts,

        Node A wants to talk to node B and not any other node, say, C. The 
question
is what does "B" mean to node A? That is, what makes node B different from
node C?

        For example, when I punch in 'https://www.amazon.com', what makes the
Amazon web server different from any other is that it has a certificate from
a trusted root authority certifying that it belongs to the rightful owner of
the domain 'amazon.com'. In other words, I don't want to talk to any
computer, I want to talk to one that can prove, by reference to an authority
I trust, that it is authorized by the rightful owner of 'amazon.com'.

        When you think about why you want to reach node B in this way, and what
makes node B different from any other node, the answer will be much easier
to give you.

        If you literally want to reach 'node B', and you trust the root CA, just
have the root CA put 'this is node B' in the certificate. So you simply
verify that node B owns the private key corresponding to the public key in
the certificate and that the certificate contains you 'this is node B'
information.

        No other node but node B can do this, unless the root CA is 
compromised. So
this reduces to having to trust the root CA. Which, if you didn't, it
wouldn't be the root. ;)

        Perhaps you misunderstand how DNS is normally used with SSL and think 
that
SSL somehow makes DNS more secure. This is not so at all. DNS is only used
to find the host which we then verify *owns* the DNS name. We could just as
well verify that it owned any other sort of thing, so long as there was a
root CA we trusted to tell us who owns things of that type.

        I hope that's clear.

        DS


______________________________________________________________________
OpenSSL Project                                 http://www.openssl.org
User Support Mailing List                    openssl-users@openssl.org
Automated List Manager                           [EMAIL PROTECTED]

Reply via email to