If you run an SHA hash on the PEM-formatted certificate that you
receive, then you can just use that as a primary key into a database
of some form that stores the certificate, as well as the information
that it authenticates.

-Kyle H

On 1/26/06, Joe Gluck <[EMAIL PROTECTED]> wrote:
> That attack is interesting, how can that be done, (sorry for bothering you 
> :-) )
>
> But cutting down the X509_cmp will not work because the memcmp
> compares the hash which if I will cut out the X509_check_purpose lines
> will not make any sense.
>
> But I think the best idea is to compare the entire text of the entire
> certificate (The text as I get in a PEM format before loading it into
> the X509 object. it is faster than hashing the same size and comparing
> the hash.
>
> Thanks
>
> On 1/26/06, Dr. Stephen Henson <[EMAIL PROTECTED]> wrote:
> > On Thu, Jan 26, 2006, Joe Gluck wrote:
> >
> > > Thank you.
> > > I still am not sure if it the best idea,
> > >
> > > Because i will be getting for example 1,000,000 a times in a day the
> > > same certificate, I don't want to do that even short process if not
> > > necessary, what I could do is compare the times between X509_cmp() and
> > > my code, or even to doing memcmp() on the original text of the X509.
> > >
> > > So I would like to know if any one thinks there is a problem with how
> > > i am doing it, or if it will be slower then using some other way to do
> > > it?
> > >
> >
> > Your algorithm ends up accessing X509 structure internals which isn't a good
> > idea if it can be avoided. It also doesn't compare the whole public key: 
> > you'd
> > also need to compare the algorithm type and its parameters (if any). There 
> > are
> > sound reasons as to why you should also check parameters. If you don't there
> > are some interesting key substitution attacks that could spoil your whole 
> > day...
> >
> > If structure internal access is considered acceptable you can cut the whole
> > thing down to the memcmp() of X509_cmp().
> >
> > Steve.
> > --
> > Dr Stephen N. Henson. Email, S/MIME and PGP keys: see homepage
> > OpenSSL project core developer and freelance consultant.
> > Funding needed! Details on homepage.
> > Homepage: http://www.drh-consultancy.demon.co.uk
> > ______________________________________________________________________
> > OpenSSL Project                                 http://www.openssl.org
> > Development Mailing List                       openssl-dev@openssl.org
> > Automated List Manager                           [EMAIL PROTECTED]
> >
> ______________________________________________________________________
> OpenSSL Project                                 http://www.openssl.org
> Development Mailing List                       openssl-dev@openssl.org
> Automated List Manager                           [EMAIL PROTECTED]
>
______________________________________________________________________
OpenSSL Project                                 http://www.openssl.org
Development Mailing List                       openssl-dev@openssl.org
Automated List Manager                           [EMAIL PROTECTED]

Reply via email to