02-09-2011
SSL uses the PPK and diffie-hellman to share a random session key, and then uses that to encrypt the session. (You thought it would be simple?) This reduces the exposure of the PPK. The session key can be regenerated at intervals, reducing its exposure.
The digital signature, chain of trust from certificate to certificate on PPK is to ensure you have the true correspondent, not some hacker who has rerouted your connection.
I just use it and trust, but this helps explain the slow start and the advantages of HTTP/1.1 persistent on https.
9 More Discussions You Might Find Interesting
1. UNIX for Dummies Questions & Answers
We have a requirement to setup secure ftp between our AIX v5.3 system and
our mainframe. We don't want to use openssh with sftp and scp. Our mainframe uses ftp over ssl/tls so we have to use this on our AIX box. We have openssl on our AIX system but I'm not sure how to setup ssl/tls over ftp
on... (4 Replies)
Discussion started by: DANNYC
4 Replies
2. UNIX for Dummies Questions & Answers
Hi everyone,
I have a quick/newb question:
I know that a public key is used to encrypt data and a private key is used to decrypt data but who keeps the public/private keys??
Does the Web Server hold both?
Does the Web Server have the public key and does the client have the private key? ... (3 Replies)
Discussion started by: tical00
3 Replies
3. Cybersecurity
Here's a pretty good, and even PHB-compatible, explanation of the current TLS/SSl protocol vulnerability, including samples. (0 Replies)
Discussion started by: pludi
0 Replies
4. UNIX for Dummies Questions & Answers
hi guys
I configured my openldap but now I want to implement SSL-TLS
This is my basic slapd.conf configuration
include /etc/openldap/schema/core.schema
include /etc/openldap/schema/cosine.schema
include /etc/openldap/schema/inetorgperson.schema
include ... (2 Replies)
Discussion started by: karlochacon
2 Replies
5. Solaris
Hi, I've used the following way to set ssh public key authentication and it is working fine on Solaris 10, RedHat Linux and SuSE Linux servers without any problem. But I got error 'Server refused our key' on Solaris 8 system. Solaris 8 uses SSH2 too. Why? Please help. Thanks.
... (1 Reply)
Discussion started by: aixlover
1 Replies
6. Red Hat
Hi guys, Those who work on Apache may help me on this.
I have following problem
Description:
The remote service encrypts traffic using TLS / SSL and permits clients to renegotiate
connections. The computational requirements for renegotiating a connection are
asymmetrical between the... (3 Replies)
Discussion started by: manalisharmabe
3 Replies
7. UNIX for Advanced & Expert Users
Hey Guys,
I am trying to setup ldap over tls in our lab. I am generating a self signed cert on the ldap server and importing that into the ldap system so it will use ldap over port 636. The clients will be a mix of solaris and redhat. I am lost on what I need to do on the client side to get... (0 Replies)
Discussion started by: s ladd
0 Replies
8. Shell Programming and Scripting
Hello,
I use the following SSH script to upload *.jpg files via FTP:
#!/usr/bin/expect
set timeout -1
spawn ftp -v -i
expect ""
send "\r"
expect "Password:"
send "\r"
expect "ftp>"
send "mput *.jpg\r"
expect "ftp>"
send "quit\r"
replaced with actual ftp server/account data.
... (5 Replies)
Discussion started by: mrpi007
5 Replies
9. UNIX for Advanced & Expert Users
Hello to all,
I'm beguinner in Linux instalations and I'm trying to Communicate from Web Sites that i have running under apache with openLDAP for users authentication using SSL mediation that seems to be connected with LDAPS.
Can someone advise me how to do this, I have already installed... (1 Reply)
Discussion started by: CPMarco
1 Replies
LEARN ABOUT LINUX
ssl_get_peer_cert_chain
SSL_get_peer_cert_chain(3SSL) OpenSSL SSL_get_peer_cert_chain(3SSL)
NAME
SSL_get_peer_cert_chain - get the X509 certificate chain of the peer
SYNOPSIS
#include <openssl/ssl.h>
STACKOF(X509) *SSL_get_peer_cert_chain(const SSL *ssl);
DESCRIPTION
SSL_get_peer_cert_chain() returns a pointer to STACKOF(X509) certificates forming the certificate chain of the peer. If called on the
client side, the stack also contains the peer's certificate; if called on the server side, the peer's certificate must be obtained
separately using SSL_get_peer_certificate(3). If the peer did not present a certificate, NULL is returned.
NOTES
The peer certificate chain is not necessarily available after reusing a session, in which case a NULL pointer is returned.
The reference count of the STACKOF(X509) object is not incremented. If the corresponding session is freed, the pointer must not be used
any longer.
RETURN VALUES
The following return values can occur:
NULL
No certificate was presented by the peer or no connection was established or the certificate chain is no longer available when a
session is reused.
Pointer to a STACKOF(X509)
The return value points to the certificate chain presented by the peer.
SEE ALSO
ssl(3), SSL_get_peer_certificate(3)
1.0.0e 2005-03-30 SSL_get_peer_cert_chain(3SSL)