Still celebrating National IT Professionals Day with 3 months of free Premium Membership. Use Code ITDAY17

x
?
Solved

secure

Posted on 2006-11-01
4
Medium Priority
?
179 Views
Last Modified: 2010-04-11
we have software that installs certificated on user host...what if client wants to install its own SSL certificate...how can that be aceived
0
Comment
Question by:perlperl
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 2
4 Comments
 

Author Comment

by:perlperl
ID: 17852701
when i install spftware, it creates a file that contain junk charavtes (certifocate.pem)

-----BEGIN CERTIFICATE-----
kjdfskjf hg fdjhglkfghlkfjjksdnklfdjkdjfksdjfklsdjf098sdf98sdfn8sdf8s9dfnsd8fn9dn8n9
jkwehjwfhkjhfkhegkehgkrkj09586n98697059876079-06597667069709679609706970
..........
........
........
sdhfslkherttgkjgkjfkjkh65464545636vggghghkjklhjljhljlkj09403khtrektrte45645kjl6j5jk
ga20c3U
-----END CERTIFICATE-----


is this just one value or does each line represents different key

because when i do "wc -l certificate.pm"it says
  19 certificates.pem


can i add my own certificate on client and server instead of the one bundled with software
0
 

Author Comment

by:perlperl
ID: 17853236
i have openSSL tool installed in my system
0
 
LVL 8

Accepted Solution

by:
jako earned 1500 total points
ID: 17856755
there's only one certificate between -----begin cert----- and -----end cert----
+ you need to read up on SSL : http://tldp.org/HOWTO/SSL-Certificates-HOWTO/ and maybe even x.509 : http://en.wikipedia.org/wiki/X.509 and related pages from there, to get you up to speed with public key cryptography you're about to deal with.

yes, the client can use their key pairs if they want to and
yes, you can probably use your own certs instead of what was bundled, but then you might break the web of trust that might be provided with the bundled certs

for more certain answers ask more specifically. especially not withholding the software title.
0

Featured Post

When ransomware hits your clients, what do you do?

MSPs: Endpoint security isn’t enough to prevent ransomware.
As the impact and severity of crypto ransomware attacks has grown, Webroot fought back, not just by building a next-gen endpoint solution capable of preventing ransomware attacks but also by being a thought leader.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

What's worse than having your data encrypted by ransomware? Getting attacked by a so-called "wiper," which simply destroys the data and offers you no hope of ever seeing it again.
What we learned in Webroot's webinar on multi-vector protection.
With Secure Portal Encryption, the recipient is sent a link to their email address directing them to the email laundry delivery page. From there, the recipient will be required to enter a user name and password to enter the page. Once the recipient …
This video Micro Tutorial shows how to password-protect PDF files with free software. Many software products can do this, such as Adobe Acrobat (but not Adobe Reader), Nuance PaperPort, and Nuance Power PDF, but they are not free products. This vide…

688 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question