On 4/17/2012 7:00 PM, Nou Dadoun wrote:
Quick question regarding certificate usage in an ssl connection; you can 
associate a number of certificates with a server endpoint - is there any way of 
deciding at runtime which certificate is presented to the client (depending on 
the identity of the client say).
Unfortunately not (almost, read on).

This has been a major problem for the top use of SSL/TLS:
https web servers.

Currently the two most common workarounds are either:

A. Assign a separate IP address or port to each certificate
  (costly given the worldwide shortage of IPv4 addresses and
  the "default firewall configuration" induced shortage of
  usable TCP ports).

B. Generate a certificate which covers all the desired
  identities, either via wildcards or SubjectAlternativeNames.

However recent TLS versions have introduced a new mechanism
where the client can tell the server which name it wants a
certificate for.  This is still not widely available in
web browsers and other stock clients, but that should improve
over time.
And would the same mechanism be usable for the certificate the client presents 
in the case of mutual authentication?
For client certificates, there is a standard mechanism, going
back at least to SSL 3, maybe even to SSL 2: The server tells
the client if it wants mutual authentication and identifies
the acceptable certificates by a list of CAs.  Clients
routinely use this to select the appropriate certificate.

(Pointers to documentation if any would be sufficient!)

Thanks .... N



Enjoy

Jakob
--
Jakob Bohm, CIO, Partner, WiseMo A/S.  http://www.wisemo.com
Transformervej 29, 2730 Herlev, Denmark.  Direct +45 31 13 16 10
This public discussion message is non-binding and may contain errors.
WiseMo - Remote Service Management for PCs, Phones and Embedded

______________________________________________________________________
OpenSSL Project                                 http://www.openssl.org
User Support Mailing List                    openssl-users@openssl.org
Automated List Manager                           majord...@openssl.org

Reply via email to