Hello

I have some generic questions about usage of openssl for https; i'm not
into security, and i 'dont know very well openssl, so maybe my questions
will appear a little noob, sorry if it does

Just for info, i'm developping a client app that have to interact with
server. I'm on linux and windows, in c++, using libneon.

I have to discuss with a server using a self signed certificate (server and
clients will be in a LAN, not over internet). I know how to check in my app
whether the certificate is valid or not, as it is self-signed and as i
didn't configurate nothing special on client side, it is not (not CA
trusted).

I plan to let user decide whether they want to trust or not, allowing them
to add exception (exactly as browsers do)
- My first question is : is it safe to store the server certificate on
client side, in order to compare it ? I guess it's not since it could be
stolen from client side ?
> a solution would be to store it as md5 ? Then at each connection, get
server certificate, compute md5 and compare ?

And if I decided to declare that certificate as safe, I have to put the
server certificate as CA certified on client installation, as in link
http://gagravarr.org/writing/openssl-certs/others.shtml#ca-openssl ?
But in that way too it could be stolen from client side, am I wrong ?

Hope my questions are clear,

Thanx in advance for help :)

Reply via email to