Re: Does a root CA need two certificates?

2005-01-19 Thread Shaun Lipscombe
* R. Markham wrote:

 I don't understand why is a root CA which everybody can download from the
 internet is more secure than if I use my own CA. I want to make it clear I
 am not against using Certificates from an official CA. But in some cases you
 can save your money as a expenses for the certificate if you use your self
 signed certificate. If you want that only authenticated user can have
 access, than you can use SSLVerifyClient in Apache.

I made the same mistake as this. Assuming that an authenticated client
is authorised.  This gave me a headache since I couldn't work out why
it's secure since anyone could obtain a signed client certificate from
a root CA and if that root CA is in the list of CA's on my webserver
they can get access. However now I understand it.  The root CA doesn't
grant a certificate saying this person is allowed access to your
website but this person is WHO THEY SAY THEY ARE.  This means it's
still up to you to decide what they should be allowed to access (their
authorization).  You've just used a different way of identifying them..
a certificate instead of a username  password.

SSLCheckClientDN and SSLFakeBasicAuth allow for authenticated access in
Apache NOT SSLVerifyClient. SSLVerifyClient just makes sure they have a
valid client certificate.
__
OpenSSL Project http://www.openssl.org
User Support Mailing Listopenssl-users@openssl.org
Automated List Manager   [EMAIL PROTECTED]


Re: SSL (or alike) over UDP

2005-01-17 Thread Shaun Lipscombe
* Ben Laurie wrote:

 Peter 'Luna' Runestig wrote:
 On Fri, 14 Jan 2005 21:10 pm, Eduardo PĂ©rez wrote:
 
 Do you know if it's possible to use SSL (or some other protocol) over
 UDP running totally in user space.
 
 
 The OpenVPN project http://openvpn.net/ runs OpenSSL over UDP, works
 great.
 
 No, it doesn't. It uses SSL do bootstrap UDP connections.

It says in the book Web Security  Commerce by Simson Garfinkel,
Gene Spafford that SSL cannot use UDP.

I read that bit just the other day :-)
__
OpenSSL Project http://www.openssl.org
User Support Mailing Listopenssl-users@openssl.org
Automated List Manager   [EMAIL PROTECTED]


Re: Using OpenSSL on unix to manage certs for Windows boxes (CSR's and PKCS12)

2005-01-14 Thread Shaun Lipscombe
* Bernhard Froehlich wrote:

 Shaun Lipscombe wrote:
 
 [...]
 One last question... it's to do with client certificates. If I have two
 websites, say, and they both require client certificates signed by the
 CA ABC. Ltd there is nothing stopping a client certificate being used
 for authorization to access both sites even though those two sites may
 not be aware of each other. Is it up to the webserver to go through the
 certificate, once its been shown as being valid, and seeing whether
 access should be granted or is there something I've missed. I created
 two sites that have a CA in common in its acceptable CA list and I can
 now access both sites with the same certificate. What can I do to avoid
 such a circumstance?
 
 You should not mix up the fact The user has a valid certificate and 
 The user has access to something.

Yes this is what I did. Thanks to you and Bernhard Froehlich I have now
got it all clear in my brain :-)

Shaun
__
OpenSSL Project http://www.openssl.org
User Support Mailing Listopenssl-users@openssl.org
Automated List Manager   [EMAIL PROTECTED]


Using OpenSSL on unix to manage certs for Windows boxes (CSR's and PKCS12)

2005-01-13 Thread Shaun Lipscombe
I have used openssl to setup a CA to sign site certificates and client
certificates.  All is working just great , however I have a couple of
questions to ask so that I dont go insane.

Why is it that a Microsoft box requires SSL certificates be imported
from a PCKS12 file when all other operating systems and software are OK
with a PEM certificate?  PCKS12 contains the private key of the key pair
along side the certificate and this is simply not necessary unless you
actually NEED the primary key.. for example the box on which you are
installing the .pfx (p12) file didn't generate the Private Key but it is
required to sign code/email using the private key, using the signed
certificate for encryption.  The primary key, I thought, should ideally
have ONE home and not be moved about even if this PCKS12 is SUPPOSEDLY
secure.  (people choose crappy passphrases so I'm sure brute forcing it
wouldn't take long with today's computers).

Another question I have is I have seen documentation on the net showing
CSR's being generated that catenate the private key and PEM encoded
certificate request prior to be sent for signing by the CA. This again
seems *strange*. Why is this done? I can give you a URL where this is
done , but I've seen the combining of the key and request in *many* net
resources and it seems *strange* to me that anyone would want to send
their private key across the insecure website along with the CSR to be
signed!

Here is an example of a site showing this:
http://sandbox.rulemaker.net/ngps/m2/howto.ca.html.  I have also seen
the primary key added to a certificate AFTER its been returned , signed,
from the CA but I guess this could just be for exporting onto a system
for which the request was made on the behalf of.  Sorry for the badly
worded sentence!
__
OpenSSL Project http://www.openssl.org
User Support Mailing Listopenssl-users@openssl.org
Automated List Manager   [EMAIL PROTECTED]


Re: Using OpenSSL on unix to manage certs for Windows boxes (CSR's and PKCS12)

2005-01-13 Thread Shaun Lipscombe
* Dr. Stephen Henson wrote:

 On Thu, Jan 13, 2005, Shaun Lipscombe wrote:
 
  Why is it that a Microsoft box requires SSL certificates be imported
  from a PCKS12 file when all other operating systems and software are OK
  with a PEM certificate?
 
 It doesn't. You can do that of course but the preferred technique is the same
 as every other environment: create a private key on the microsoft box, sign a
 request with it, send request to the CA and install the resulting certificate.

Ok. That makes far more sense since the private key doesn't have to be
created on one box and transferred to the m$ box i.e. its more secure. I
didn't want to use the Certification stuff that comes with Windows 2000
Server coz it's a tad expensive and openssl works a charm.

 For MSIE you can use Xenroll for that.

Not heard of that but will take a looksie.

  Another question I have is I have seen documentation on the net showing
  CSR's being generated that catenate the private key and PEM encoded
  certificate request prior to be sent for signing by the CA. This again
  seems *strange*. Why is this done?
 
 Probably for the same reasons some sites suggest that a CA certificate is
 installed by creating a PKCS#12 file including the CA private key: sheer
 ignorance :-(

I've not heard of that but installing root certificates along with its
primary key completely underpins the whole concept of a chain of trust.
Glad to hear that its ignorance and me not understanding something :-)

I'll delete that site from my bookmarks :-)

One last question... it's to do with client certificates. If I have two
websites, say, and they both require client certificates signed by the
CA ABC. Ltd there is nothing stopping a client certificate being used
for authorization to access both sites even though those two sites may
not be aware of each other. Is it up to the webserver to go through the
certificate, once its been shown as being valid, and seeing whether
access should be granted or is there something I've missed. I created
two sites that have a CA in common in its acceptable CA list and I can
now access both sites with the same certificate. What can I do to avoid
such a circumstance?

Shaun
__
OpenSSL Project http://www.openssl.org
User Support Mailing Listopenssl-users@openssl.org
Automated List Manager   [EMAIL PROTECTED]