"Ralf S. Engelschall" wrote:

> > > SSLRequire %{SSL_CLIENT_I_DN} != %{SSL_CLIENT_S_DN}
> >
> > Ok, but this seemes to help only if a client's certificate itself is self-signed.
> > But what if it is signed by a custom-made CA whoes cert is self-signed? Or even
> > if there are more levels in chain whoes root is a self-signed CA certificate?
>
> That's how a cert chain work: the root CA is always self-signed!  What you

I know

> mean is whether the root cert is signed by a CA which is known to you. That's

Right.

> what can be done with SSLVerifyClient and SSLCACertificatePath.

I've just reread the manual. It says "...depth of 1 means the client certificate can
be self-signed or has to be signed by a CA which is directly known to the server".
If this means that not self-signed cert is supposed to be a valid cert *only* if it's
chain leads to a cert signed by *real* CA, then its just what I need.
Thank you.

--
Anton Voronin                | Ural Regional Center of FREEnet,
[EMAIL PROTECTED]              | Southern Ural University, Chelyabinsk, Russia
http://www.urc.ac.ru/~anton  | Programmer & System Administrator



______________________________________________________________________
Apache Interface to SSLeay (mod_ssl)   www.engelschall.com/sw/mod_ssl/
Official Support Mailing List               [EMAIL PROTECTED]
Automated List Manager                       [EMAIL PROTECTED]

Reply via email to