Is it possible to extend the expiry of this certificate
without changing any other fields in the certificate?
to which it seems that the answer is
Yes,
How could the answer be anything other than yes?
All too easily. Because as you ourself point out, such a change would
invalidate
That line means if benc still points at something, free it. The problem
is - more likely than not, somebody has already freed benc, but did not set
benc to zero (or NULL). As a result, this check (line 640) says benc is not
zero, so it must be pointing at something that must be freed, so invoke
... is it necessary to
issue ONE certificate to EACH individual.
Yes. The problem of granting access based on membership in a
group is an authorization problem.
Correct.
This doesn't have
anything to do with certificates -- permissions and roles
change independently of binding
Well, the Subject Distinguished Name should have the
Organization...
Can you envision long-lived certs issued by gov't - like passports? In that
case, Organization would not have the same semantics. But this is less
relevant for our discussion.
...but I strongly disagree with you if you
For both the responses I got, it looks like the server need
to access the information (whether identity or attribute or
whatever) present in the certificate and use that to decide
the permissions for the peer that represented this certificate.
Is my understanding correct?
Partially so. An
There are security paradigms such as SSH where you use leap of
faith: strictly you haven't authenticated the remote end, but you
know that your peer is the other box next to you, you
verified its PK fingerprint visually, so you approve (authorize)
that peer from now on.
You are
Traditionally the term self-signed applied to certificates that are NOT
signed by anybody but the owner of the given key pair. With all the relevant
security implications.
What is the purpose of checking for self-signed cert? To see if only the
owner signed that key? Of to see that key owner ALSO
?
On 9/14/06, Mouse [EMAIL PROTECTED] wrote:
Did anybody use OpenSSL successfully for creating and processing
Attribute Certificates?
very much .. chek dis link.. http://openpmi.sourceforge.net/
Is there any helpful HOWTO or TFM?
download openssl distro(patched to support AC) frm
-Mensaje original-
De: [EMAIL PROTECTED]
[mailto:[EMAIL PROTECTED]
En nombre de Mouse
Enviado el: jueves, 14 de septiembre de 2006 15:49
Para: openssl-users@openssl.org
Asunto: RE: Attribute Certificate with OpenSSL?
First - thank you! At least it was something.
I went
Did anybody use OpenSSL successfully for creating and processing Attribute
Certificates?
Is there any helpful HOWTO or TFM?
__
OpenSSL Project http://www.openssl.org
User Support Mailing List
There is one more problem with attributes and official CA's. If you are your
own CA, it makes a big difference (less trust around in the world - but you
can enforce any attribute verification policy that you choose yo).
Atttributes are added at the time of certification (good - so they can't be
process. So, you
need not a certificates from cert. providers, but AC
infrastructure solution. Give some attention to openPERMIS or
PERMIS projects, probably this helps.
Regards,
Dmitrij
-Original Message-
From: [EMAIL PROTECTED]
[mailto:[EMAIL PROTECTED] On Behalf Of Mouse
It doesn't makes much sense to add attributes to certs if values of those
attributes can't be verified. Attribute Certificate seems the right way to
go (thanks, Vijay!).
The question is - do our mainstream CA's (such as VeriSign, etc.) support
Attribute Certificate?
Tnx!
-Original
PEM = Privacy-Enhanced Mail.
-Original Message-
From: [EMAIL PROTECTED]
[mailto:[EMAIL PROTECTED] On Behalf Of Bo Xie
Sent: Monday, July 31, 2006 20:08
To: openssl-users@openssl.org
Subject: What does PEM mean?
I know openSSL supports .pem format. But what does PEM mean?
The security work in SNMPv3 is old and outdated and years
behind current practice. Some of that is understandable, but
but even back then we knew enough to know that raw UDP is
almost architecturally flawed.
Not quite on the list topic - but if you were aware of the constraints
placed on
openSSL 0.9.8 comes with support for DTLS, which is TLS over UDP.
Another point for the original poster to keep in mind is that
SSL/TLS can require multiple read/writes for a single
application-level packet exchange.
SA establishment cost...
This isn't always obvious to folks starting
16 matches
Mail list logo