Kyle Hamilton wrote:

> You can have B contact the server and obtain a signed "authorization
> certificate" for its key that uses custom extensions to specify 'is
> authorized to connect to A' for a given timeframe, and have that be
> the certificate that B presents when connecting to A.  Then, A looks
> for the 'authorized to connect to' list, finds itself in there, checks
> validity time, and makes the decision based on that.  No need to share
> the public keys, nor is there a need to tell both sides about it if
> the signature can be verified.
> 
> If you want the server to mediate access between peers without having
> to have your clients constantly connected to the server, that's a way
> to do it.

Maybe I'm missing something, but it doesn't seem to me like that would work. 
How does B know it is talking to A? If you expect the "is authorized to connect 
to" certificate to contain both public keys, then how can you say "no need to 
share the public keys"? And if not, how does B know it is talking to A and A to 
B?

I'm probably misunderstanding you. But if I can misunderstand it, the OP 
probably can too.

And with respect to the other thread, I agree with you. The level of security 
should be the highest that doesn't require sacrificing things that are more 
important than security. Sometimes all you need is to keep out your kid sister, 
sometimes you have to keep out professional spies financed by a major 
government. The solutions appropriate to those two extremes are very different. 
Don't let the fact that you can't feasibly implement a perfect solution keep 
you from implementing one that is more than good enough.

DS


______________________________________________________________________
OpenSSL Project                                 http://www.openssl.org
User Support Mailing List                    openssl-users@openssl.org
Automated List Manager                           [EMAIL PROTECTED]

Reply via email to