08-05-2014
In the first case, Verisign has given a certificate to SomeSmallerCA. If you trust Verisign, you can be sure that you are talking to SomeSmallerCA. This does not mean that Verisign assures you that SomeSmallerCA knows what they are doing. So in the first example you have to trust that SomeSmallerCA has verified that example.com is who they say they are. The Verisign certificate only guarantees that you are talking to SomeSmallerCA.
In the second example Verisign is saying that they did an extended validation. There are two levels of validation and "extended" is the better of the two. I'm not sure of the details.
10 More Discussions You Might Find Interesting
1. Forum Support Area for Unregistered Users & Account Problems
TO WHOM IT MAY CONCERN:
I am Ayanda Fuzile, I would like to request my UNIX Certificate, I completed my course in 2000. My email adress is removed, my postal adress is also removed.
Kind Regards,
Ayanda Fuzile (1 Reply)
Discussion started by: afuzile
1 Replies
2. UNIX for Advanced & Expert Users
A client application is encrypting a text using private key and sends through socket.
My application(server written in c/c++,unix) receives the chiper-text through socket.
I have client's digital certificate.
now, how do I decrypt(may be using openssl library) this ciper-text using client's... (1 Reply)
Discussion started by: johnbach
1 Replies
3. Web Development
Dear All
Anyone know how to issue two different certification on apache virtualhost fyi i have one virtualhost eg 69.192.1.25:443 already signed with verisign how can i configure another virtualhost 69.192.1.25:443 which signing with another certificate which self signing. i search net not... (1 Reply)
Discussion started by: netxus
1 Replies
4. Cybersecurity
Hi guys.
I have some questions about ssl certificates.
I looked at SSL providers and saw that they are providing 2 types of certificates: per server or per domain.
my server host name is: srv1.example.com
I have a smtp, imap, web server on this box. but all services accessed by different... (1 Reply)
Discussion started by: majid.merkava
1 Replies
5. UNIX for Dummies Questions & Answers
Hi all!
I wanted to look at the key length of a certificate chain we have. When I do the conventional export command using keytool I will only get the end user cert.
keytool -export -alias aliasname -file filename.cer -keystore keystorename
The above code will only give me the end user... (2 Replies)
Discussion started by: Keepcase
2 Replies
6. Cybersecurity
Hi,
I would like to know if certificate for mydomain.com would work as well for www.mydomain.com and for all subdomain of example.com?
I ask this because I want to buy a certificate and I was not what domain should I ask the certificate for? (0 Replies)
Discussion started by: programAngel
0 Replies
7. Cybersecurity
Hey everyone, I'm trying to get a lay of the land for OS and Application Certificate Stores. Can someone confirm that I have this concept right?
If the application you're using say Firefox has it's own trusted CA store, it uses that exclusively. So if you're running firefox in Windows, Firefox... (4 Replies)
Discussion started by: Lost in Cyberia
4 Replies
8. HP-UX
We are running HP-UX 11v1 and are about to upgrade sendmail to 8.13.3 to allow support for TLS. Enabling TLS seems pretty straightforward, but I'm wondering if an SSL certificate is required for this. Our MS Exchange server does use a certificate. Do I need to arrange for a public certificate to... (3 Replies)
Discussion started by: jduehmig
3 Replies
9. UNIX for Advanced & Expert Users
:rolleyes:I am trying to setup all certificate based client-server environment in Linux using vsftpd and curl with openssl.
I would like to make a user access with vsftpd certificate and user own client certificate (self-signed) with private/public key.
I don't see google posts about the my plan... (4 Replies)
Discussion started by: gogogo
4 Replies
10. Shell Programming and Scripting
I can view the openSSL certifcate with this command
openssl x509 -text -in myCertificate.pem
I just wanted to see when the cert will expire only. The line which I want to read is,
Not After : Jul 28 14:09:57 2015 GMT
I tried using the grep command but it doesn't display anything.
grep... (1 Reply)
Discussion started by: Loc
1 Replies
LEARN ABOUT CENTOS
ssl_get_peer_certificate
SSL_get_peer_certificate(3) OpenSSL SSL_get_peer_certificate(3)
NAME
SSL_get_peer_certificate - get the X509 certificate of the peer
SYNOPSIS
#include <openssl/ssl.h>
X509 *SSL_get_peer_certificate(const SSL *ssl);
DESCRIPTION
SSL_get_peer_certificate() returns a pointer to the X509 certificate the peer presented. If the peer did not present a certificate, NULL is
returned.
NOTES
Due to the protocol definition, a TLS/SSL server will always send a certificate, if present. A client will only send a certificate when
explicitly requested to do so by the server (see SSL_CTX_set_verify(3)). If an anonymous cipher is used, no certificates are sent.
That a certificate is returned does not indicate information about the verification state, use SSL_get_verify_result(3) to check the
verification state.
The reference count of the X509 object is incremented by one, so that it will not be destroyed when the session containing the peer
certificate is freed. The X509 object must be explicitly freed using X509_free().
RETURN VALUES
The following return values can occur:
NULL
No certificate was presented by the peer or no connection was established.
Pointer to an X509 certificate
The return value points to the certificate presented by the peer.
SEE ALSO
ssl(3), SSL_get_verify_result(3), SSL_CTX_set_verify(3)
1.0.1e 2013-02-11 SSL_get_peer_certificate(3)