On Mon, Jul 13, 2009 at 06:01:02PM +0100, openssl-us...@coreland.ath.cx wrote:

> Hello.
> 
> On 2009-07-13 12:15:21, Goetz Babin-Ebell wrote:
> > Do you also control client certificate generation ?
> > 
> > With that you could configure the server to only accept client
> > certificates issued by your own CA and set the user name in the client
> > certificates subject name.
> > 
> > This way you would only have to store your CA certificate and the CRL
> > for all client certificates that became invalid on the server.
> 
> I believe I will be, but what are my options if I don't control
> cert generation?
> 
> I think this is why I considered caching copies of client certs
> first of all - I can't verify the identity of an untrusted cert
> but I can at least check that the user presents the same cert
> next time.
> 
> > If you accept client certificates issued by foreign (not controlled by
> > you) CAs, you would have to find a way to map between certificate and user.
> > Here would be a mepping from issuer name / serial number of the client
> > cert sufficient...
> 
> Right, I'll keep that in mind.

I would use the public-key fingerprint, unless the trust chain is verified
from a fixed set of trusted issuers.

-- 
        Viktor.
______________________________________________________________________
OpenSSL Project                                 http://www.openssl.org
User Support Mailing List                    openssl-users@openssl.org
Automated List Manager                           majord...@openssl.org

Reply via email to