Frans Gunawan wrote:

Hello,
How to test client auth with the "openssl s_server" and "openssl s_client"
to show that the authentication is using the client auth.
Thank you,
Frans

Quoted from s_server-manpage (http://www.openssl.org/docs/apps/s_server.html):
*

**-verify depth*, *-Verify depth**

    The verify depth to use. This specifies the maximum length of the
    client certificate chain and makes the server request a
    certificate from the client. With the *-verify* option a
    certificate is requested but the client does not have to send one,
    with the *-Verify* option the client must supply a certificate or
    an error occurs.

*So if you use this option on the server the client must authenticate. Is it this you were asking?

Hope it helps.
Ted
;)

--
PGP Public Key Information
Download complete Key from http://www.convey.de/ted/tedkey_convey.asc
Key fingerprint = 31B0 E029 BCF9 6605 DAC1  B2E1 0CC8 70F4 7AFB 8D26

Attachment: smime.p7s
Description: S/MIME Cryptographic Signature

Reply via email to