On Fri September 25 2009, Michael Prinzinger wrote:
> Dear Victor,
> 
> thanks for your help.
> The problem is that I need to understand OpenSSL and its mechanisms and
> possibilities in order to find a way to implement the design of the
> protocol.
> It would be nice if you could help a little bit further still, but I will
> understand if you should choose not to.
>

The openSSL project now supports consultants for hire - -
One path to solving your problems: just send them money.

Mike 
> you compare the enclosed peer certificate (public key fingerprint) with the
> > peer certificate (public key fingerprint) from the SSL session.
> >
> I wrote a customized "check certificate" method, that simply compares the
> certificate the client offered during the connection build up, to the
> certificate we know it should be using. This works fine.
> 
> However I think it would be more secure to be able to verify that the client
> is actually in posession of the private key belonging to this certificate,
> right?
> The protocol design, as I should implement it, however does not speak about
> signing a part of the payload with this private key; else it would be easy
> for me to do.
> That is why I hope to find some OpenSSL mechanism, that would allow me to do
> that independent of the payload.
> 
> Thank you for your help and your time, and sorry for not yet understanding
> everything perfectly.
> 
> Michael
> 
> 
> 
> On Thu, Sep 24, 2009 at 8:20 PM, Victor Duchovni <
> victor.ducho...@morganstanley.com> wrote:
> 
> > On Thu, Sep 24, 2009 at 08:03:49PM +0200, Michael Prinzinger wrote:
> >
> > > Dear Victor,
> > >
> > > it is almost working.
> > > with the cerify_callback function returning 1, I can establish a
> > connection.
> > > However when I call  SSL_get_verify_result()  it tells me the certificate
> > is
> > > not in the trust store.
> >
> > You don't care. Don't bother with SSL_get_verify_result() it is of
> > no consequence. You need to compare the certificate *directly* against
> > what you expected to receive.
> >
> > Or your agreement that I understood your problem is in error.
> >
> > I think I need to stop here. You are still asking API questions, when
> > you still don't have a design and are struggling with related security
> > principles.
> >
> > You are not yet ready to write the code. First solve the problem "on
> > paper" with a design, that is written in words, not computer code
> > and relates the security steps taken to the security requirements
> > of the protocol and application use-case.
> >
> > --
> >
> >  /"\ ASCII RIBBON                  NOTICE: If received in error,
> >  \ / CAMPAIGN     Victor Duchovni  please destroy and notify
> >  X AGAINST       IT Security,     sender. Sender does not waive
> >  / \ HTML MAIL    Morgan Stanley   confidentiality or privilege,
> >                                   and use is prohibited.
> >
> 


______________________________________________________________________
OpenSSL Project                                 http://www.openssl.org
User Support Mailing List                    openssl-users@openssl.org
Automated List Manager                           majord...@openssl.org

Reply via email to