Go Premium for a chance to win a PS4. Enter to Win

x
?
Solved

secure

Posted on 2006-11-01
4
Medium Priority
?
180 Views
Last Modified: 2010-04-11
we have software that installs certificated on user host...what if client wants to install its own SSL certificate...how can that be aceived
0
Comment
Question by:perlperl
  • 2
4 Comments
 

Author Comment

by:perlperl
ID: 17852701
when i install spftware, it creates a file that contain junk charavtes (certifocate.pem)

-----BEGIN CERTIFICATE-----
kjdfskjf hg fdjhglkfghlkfjjksdnklfdjkdjfksdjfklsdjf098sdf98sdfn8sdf8s9dfnsd8fn9dn8n9
jkwehjwfhkjhfkhegkehgkrkj09586n98697059876079-06597667069709679609706970
..........
........
........
sdhfslkherttgkjgkjfkjkh65464545636vggghghkjklhjljhljlkj09403khtrektrte45645kjl6j5jk
ga20c3U
-----END CERTIFICATE-----


is this just one value or does each line represents different key

because when i do "wc -l certificate.pm"it says
  19 certificates.pem


can i add my own certificate on client and server instead of the one bundled with software
0
 

Author Comment

by:perlperl
ID: 17853236
i have openSSL tool installed in my system
0
 
LVL 8

Accepted Solution

by:
jako earned 1500 total points
ID: 17856755
there's only one certificate between -----begin cert----- and -----end cert----
+ you need to read up on SSL : http://tldp.org/HOWTO/SSL-Certificates-HOWTO/ and maybe even x.509 : http://en.wikipedia.org/wiki/X.509 and related pages from there, to get you up to speed with public key cryptography you're about to deal with.

yes, the client can use their key pairs if they want to and
yes, you can probably use your own certs instead of what was bundled, but then you might break the web of trust that might be provided with the bundled certs

for more certain answers ask more specifically. especially not withholding the software title.
0

Featured Post

Put Machine Learning to Work--Protect Your Clients

Machine learning means Smarter Cybersecurity™ Solutions.
As technology continues to advance, managing and analyzing massive data sets just can’t be accomplished by humans alone. It requires huge amounts of memory and storage, as well as high-speed processing of the cloud.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Tech spooks aren't just for those who are tech savvy, it also happens to those of us running a business. Check out the top tech spooks for business owners.
Phishing emails are a popular malware delivery vehicle for attack.  While there are many ways for an attacker to increase the chances of success for their phishing emails, one of the most effective methods involves spoofing the message to appear to …
We’ve all felt that sense of false security before—locking down external access to a database or component and feeling like we’ve done all we need to do to secure company data. But that feeling is fleeting. Attacks these days can happen in many w…
In a question here at Experts Exchange (https://www.experts-exchange.com/questions/29062564/Adobe-acrobat-reader-DC.html), a member asked how to create a signature in Adobe Acrobat Reader DC (the free Reader product, not the paid, full Acrobat produ…

916 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question