On Sat, Oct 6, 2012 at 2:52 PM, Charles Mills <charl...@mcn.org> wrote: > I have recently written a product that incorporates SSL/TLS server code that > processes client certificates. I designed what I thought made sense at the > time but now I am wondering if what I did was best. > > In the product's configuration file the sysadmin may optionally include a > whitelist of client names. If the sysadmin does so, then the server requests > a client certificate. At least one of the names (subject O= and Alternative > names, including wildcards) in the certificate must match one of the names > in the whitelist or I reject the session. > > Something I saw recently got me to wondering whether I should have made some > sort of provision for checking IP addresses: perhaps verifying that the > client IP address appeared in the Alternative names in the client > certificate as well as in the whitelist? Or perhaps that the IP address > matched an alternative name and the subject name appeared in the whitelist? > > Comments?
You don't say what you're trying to achieve! But whatever it is, none of the above makes a lot of sense - anyone can make a cert with whatever subject and alternate names they want... ______________________________________________________________________ OpenSSL Project http://www.openssl.org User Support Mailing List openssl-users@openssl.org Automated List Manager majord...@openssl.org