Hi,

> > I don't recommend this practice. It reduces the certificate to an
> > unauthenticated container of the public key and as such constitutes
> > poor security practice; it is both misleading, and places an undue
> > burden on users to understand the security implications of such a
> > choice.
>
> You are right if this were the only way to authenticate servers. What I
> intend is to use the normal way with CAs, but leave the choice to
> the user if
> the CA is not known. I particularly dislike the behaviour of MSIE
> _not_ to
> connect to a secure site with an unknown CA. Even if I _do_
> understand the
> implications.

On "medium" security settings for the Internet, my copy of MSIE pops up a
small series of dialog boxes asking me if I'd like to trust the
just-encountered server certificate that doesn't happen to chain to a
trusted CA certificate. I just did this test with my browser connecting to a
friend's web site with a dummy server certificate installed for his secure
web server.

> > That said, the answer to the technical portions of the question
> > are:
> >
> > The standard serialization format for certificates is DER.  It
> > comes over the wire that way.  The SSLeay package has APIs to deal
> > with encoding and decoding from this format.  See in particular
> > the i2d_X509 and d2i_X509 routines.  Also see the ASN1_i2d_fp and
> > ASN1_i2d_bio routines for combining these with file and buffered
> > BIO.  [crypto/asn1]
>
> Thanks! That's what I was looking for!

Ok, I think I get it now...per your original post, this isn't necessarily
for https. You want to install your own custom trust decider for your
particular protocol when chaining fails?

Best Regards,
George

+-------------------------------------------------------------------------+
| Administrative requests should be sent to [EMAIL PROTECTED] |
| List service provided by Open Software Associates, http://www.osa.com/  |
+-------------------------------------------------------------------------+

Reply via email to