Solved

secure

Posted on 2006-11-01
4
154 Views
Last Modified: 2010-04-11
we have software that installs certificated on user host...what if client wants to install its own SSL certificate...how can that be aceived
0
Comment
Question by:perlperl
  • 2
4 Comments
 

Author Comment

by:perlperl
Comment Utility
when i install spftware, it creates a file that contain junk charavtes (certifocate.pem)

-----BEGIN CERTIFICATE-----
kjdfskjf hg fdjhglkfghlkfjjksdnklfdjkdjfksdjfklsdjf098sdf98sdfn8sdf8s9dfnsd8fn9dn8n9
jkwehjwfhkjhfkhegkehgkrkj09586n98697059876079-06597667069709679609706970
..........
........
........
sdhfslkherttgkjgkjfkjkh65464545636vggghghkjklhjljhljlkj09403khtrektrte45645kjl6j5jk
ga20c3U
-----END CERTIFICATE-----


is this just one value or does each line represents different key

because when i do "wc -l certificate.pm"it says
  19 certificates.pem


can i add my own certificate on client and server instead of the one bundled with software
0
 

Author Comment

by:perlperl
Comment Utility
i have openSSL tool installed in my system
0
 
LVL 8

Accepted Solution

by:
jako earned 500 total points
Comment Utility
there's only one certificate between -----begin cert----- and -----end cert----
+ you need to read up on SSL : http://tldp.org/HOWTO/SSL-Certificates-HOWTO/ and maybe even x.509 : http://en.wikipedia.org/wiki/X.509 and related pages from there, to get you up to speed with public key cryptography you're about to deal with.

yes, the client can use their key pairs if they want to and
yes, you can probably use your own certs instead of what was bundled, but then you might break the web of trust that might be provided with the bundled certs

for more certain answers ask more specifically. especially not withholding the software title.
0

Featured Post

Comprehensive Backup Solutions for Microsoft

Acronis protects the complete Microsoft technology stack: Windows Server, Windows PC, laptop and Surface data; Microsoft business applications; Microsoft Hyper-V; Azure VMs; Microsoft Windows Server 2016; Microsoft Exchange 2016 and SQL Server 2016.

Join & Write a Comment

This paper addresses the security of Sennheiser DECT Contact Center and Office (CC&O) headsets. It describes the DECT security chain comprised of “Pairing”, “Per Call Authentication” and “Encryption”, which are all part of the standard DECT protocol.
Big data transfers via information superhighways require special attention and protection. Learn more about the IT-regulations of the country where your server is located. Analyze cloud providers and their encryption systems for safe data transit. S…
Sending a Secure fax is easy with eFax Corporate (http://www.enterprise.efax.com). First, Just open a new email message.  In the To field, type your recipient's fax number @efaxsend.com. You can even send a secure international fax — just include t…
This demo shows you how to set up the containerized NetScaler CPX with NetScaler Management and Analytics System in a non-routable Mesos/Marathon environment for use with Micro-Services applications.

772 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

10 Experts available now in Live!

Get 1:1 Help Now