Solved

secure

Posted on 2006-11-01
4
170 Views
Last Modified: 2010-04-11
we have software that installs certificated on user host...what if client wants to install its own SSL certificate...how can that be aceived
0
Comment
Question by:perlperl
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 2
4 Comments
 

Author Comment

by:perlperl
ID: 17852701
when i install spftware, it creates a file that contain junk charavtes (certifocate.pem)

-----BEGIN CERTIFICATE-----
kjdfskjf hg fdjhglkfghlkfjjksdnklfdjkdjfksdjfklsdjf098sdf98sdfn8sdf8s9dfnsd8fn9dn8n9
jkwehjwfhkjhfkhegkehgkrkj09586n98697059876079-06597667069709679609706970
..........
........
........
sdhfslkherttgkjgkjfkjkh65464545636vggghghkjklhjljhljlkj09403khtrektrte45645kjl6j5jk
ga20c3U
-----END CERTIFICATE-----


is this just one value or does each line represents different key

because when i do "wc -l certificate.pm"it says
  19 certificates.pem


can i add my own certificate on client and server instead of the one bundled with software
0
 

Author Comment

by:perlperl
ID: 17853236
i have openSSL tool installed in my system
0
 
LVL 8

Accepted Solution

by:
jako earned 500 total points
ID: 17856755
there's only one certificate between -----begin cert----- and -----end cert----
+ you need to read up on SSL : http://tldp.org/HOWTO/SSL-Certificates-HOWTO/ and maybe even x.509 : http://en.wikipedia.org/wiki/X.509 and related pages from there, to get you up to speed with public key cryptography you're about to deal with.

yes, the client can use their key pairs if they want to and
yes, you can probably use your own certs instead of what was bundled, but then you might break the web of trust that might be provided with the bundled certs

for more certain answers ask more specifically. especially not withholding the software title.
0

Featured Post

Free Tool: Subnet Calculator

The subnet calculator helps you design networks by taking an IP address and network mask and returning information such as network, broadcast address, and host range.

One of a set of tools we're offering as a way of saying thank you for being a part of the community.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Liquid Web and Plesk discuss how to simplify server management with a single tool  in their webinar.
The recent Petya-like ransomware attack served a big blow to hundreds of banks, corporations and government offices The Acronis blog takes a closer look at this damaging worm to see what’s behind it – and offers up tips on how you can safeguard your…
Nobody understands Phishing better than an anti-spam company. That’s why we are providing Phishing Awareness Training to our customers. According to a report by Verizon, only 3% of targeted users report malicious emails to management. With compan…
With Secure Portal Encryption, the recipient is sent a link to their email address directing them to the email laundry delivery page. From there, the recipient will be required to enter a user name and password to enter the page. Once the recipient …
Suggested Courses
Course of the Month7 days, 1 hour left to enroll

623 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question