RE: client auth security problem?

2000-01-02 Thread Jeffrey Altman
> > I still don't follow. For example, if Bob has a cert with his name, > public key, some encrypted private data, and the CA signature. When > Bob sends his cert to a server to make a SSL connection, his cert might > be intercepted by John. And then, John could use the same cert to fake > as Bob

Re: client auth security problem?

1999-12-17 Thread dreamwvr
hi, last time i checked it sends the results as your auth cert.. you do need to enter a passphrase or cache it to produce the unique result that is shuttled to the server. this is the means used to verify you are who you say you are.. what you have, and what you know.. hmmm... which means th

Re: client auth security problem?

1999-12-16 Thread Jeffrey Altman
> > >From my understanding, the client cert is transmitted in clear. > When server receives the client cert, server verifies the client > cert using a CA (or chained CAs), like verifying the date, signature, > etc. The question I have is that whoever could intercepts the client > cert could fake

Re: client auth security problem?

1999-12-16 Thread Dr Stephen Henson
Yunhong Li wrote: > > >From my understanding, the client cert is transmitted in clear. > When server receives the client cert, server verifies the client > cert using a CA (or chained CAs), like verifying the date, signature, > etc. The question I have is that whoever could intercepts the client

client auth security problem?

1999-12-16 Thread Yunhong Li
>From my understanding, the client cert is transmitted in clear. When server receives the client cert, server verifies the client cert using a CA (or chained CAs), like verifying the date, signature, etc. The question I have is that whoever could intercepts the client cert could fake the client.