Hi all,

To properly validate the certificate, the steps in RFC5280 Section 6 need to be 
followed. This allows for validation of the certificate, as well as the chain 
back to a trusted Root.

OpenSSL 1.0.1 has most of the pieces in place to do this, but there are a few 
areas where you would need to supplement this with additional code, 
specifically surrounding obtaining and evaluating the revocation information. 
Doing this properly and efficiently can be a bit tricky (especially in high 
volume environments), but there exists tools like Pathfinder 
(http://www.carillon.ca/tools/pathfinder) that can handle this for you.

Have fun.

Patrick.

On 2013-04-10, at 9:28 PM, Salz, Rich wrote:

> The proper term is proof of possession.  SSL/TLS define how to do it in the 
> protocol spec. 
> 
>       /r$
> 
> --  
> Principal Security Engineer
> Akamai Technology
> Cambridge, MA
> 
> ______________________________________________________________________
> OpenSSL Project                                 http://www.openssl.org
> Development Mailing List                       openssl-dev@openssl.org
> Automated List Manager                           majord...@openssl.org

---
Patrick Patterson
Chief PKI Architect
Carillon Information Security Inc.
http://www.carillon.ca





______________________________________________________________________
OpenSSL Project                                 http://www.openssl.org
Development Mailing List                       openssl-dev@openssl.org
Automated List Manager                           majord...@openssl.org

Reply via email to