Return-Path: X-Original-To: apmail-httpd-users-archive@www.apache.org Delivered-To: apmail-httpd-users-archive@www.apache.org Received: from mail.apache.org (hermes.apache.org [140.211.11.3]) by minotaur.apache.org (Postfix) with SMTP id 26E751794D for ; Sun, 23 Aug 2015 06:51:38 +0000 (UTC) Received: (qmail 55796 invoked by uid 500); 23 Aug 2015 06:51:35 -0000 Delivered-To: apmail-httpd-users-archive@httpd.apache.org Received: (qmail 55758 invoked by uid 500); 23 Aug 2015 06:51:35 -0000 Mailing-List: contact users-help@httpd.apache.org; run by ezmlm Precedence: bulk Reply-To: users@httpd.apache.org list-help: list-unsubscribe: List-Post: List-Id: Delivered-To: mailing list users@httpd.apache.org Received: (qmail 55748 invoked by uid 99); 23 Aug 2015 06:51:35 -0000 Received: from Unknown (HELO spamd1-us-west.apache.org) (209.188.14.142) by apache.org (qpsmtpd/0.29) with ESMTP; Sun, 23 Aug 2015 06:51:35 +0000 Received: from localhost (localhost [127.0.0.1]) by spamd1-us-west.apache.org (ASF Mail Server at spamd1-us-west.apache.org) with ESMTP id C3163DEAB2 for ; Sun, 23 Aug 2015 06:51:34 +0000 (UTC) X-Virus-Scanned: Debian amavisd-new at spamd1-us-west.apache.org X-Spam-Flag: NO X-Spam-Score: 2.786 X-Spam-Level: ** X-Spam-Status: No, score=2.786 tagged_above=-999 required=6.31 tests=[HTML_IMAGE_ONLY_32=0.001, HTML_MESSAGE=3, KAM_LAZY_DOMAIN_SECURITY=1, MIME_QP_LONG_LINE=0.001, RP_MATCHES_RCVD=-1.227, T_REMOTE_IMAGE=0.01, URIBL_BLOCKED=0.001] autolearn=disabled Received: from mx1-us-west.apache.org ([10.40.0.8]) by localhost (spamd1-us-west.apache.org [10.40.0.7]) (amavisd-new, port 10024) with ESMTP id N_a4ceZ12TiY for ; Sun, 23 Aug 2015 06:51:27 +0000 (UTC) Received: from caido.ro (caido.ro [86.107.248.7]) by mx1-us-west.apache.org (ASF Mail Server at mx1-us-west.apache.org) with ESMTP id A4BBF20646 for ; Sun, 23 Aug 2015 06:51:26 +0000 (UTC) Received: from localhost (localhost [127.0.0.1]) by caido.ro (Postfix) with ESMTP id AAE5E140C06 for ; Sun, 23 Aug 2015 10:09:52 +0300 (EEST) Received: from caido.ro ([127.0.0.1]) by localhost (caido.ro [127.0.0.1]) (amavisd-new, port 10032) with ESMTP id hSS1fwuQ-jzL for ; Sun, 23 Aug 2015 10:09:51 +0300 (EEST) Received: from localhost (localhost [127.0.0.1]) by caido.ro (Postfix) with ESMTP id A5239140C07 for ; Sun, 23 Aug 2015 10:09:51 +0300 (EEST) X-Amavis-Modified: Mail body modified (using disclaimer) - caido.ro X-Virus-Scanned: amavisd-new at caido.ro Received: from caido.ro ([127.0.0.1]) by localhost (caido.ro [127.0.0.1]) (amavisd-new, port 10026) with ESMTP id qouWS-5vehUJ for ; Sun, 23 Aug 2015 10:09:51 +0300 (EEST) Received: from [127.0.0.1] (unknown [89.43.152.14]) by caido.ro (Postfix) with ESMTPSA id 4F4F2140C06 for ; Sun, 23 Aug 2015 10:09:51 +0300 (EEST) From: "Sterpu Victor" To: users@httpd.apache.org Date: Sun, 23 Aug 2015 06:51:10 +0000 Message-Id: Reply-To: "Sterpu Victor" User-Agent: eM_Client/6.0.21372.0 Mime-Version: 1.0 Content-Type: multipart/alternative; boundary="------=_MB52D21C19-8A60-45AC-BB39-736050B2634C" X-Antivirus: avast! (VPS 150822-0, 08/23/2015), Outbound message X-Antivirus-Status: Clean Subject: [users@httpd] SSL - How client certificates are verified? --------=_MB52D21C19-8A60-45AC-BB39-736050B2634C Content-Type: text/plain; format=flowed; charset=utf-8 Content-Transfer-Encoding: quoted-printable Hello I have a web page that asks for client certificate. These are the options for this: SSLVerifyClient require SSLVerifyDepth 10 How does SSLVerifyClient verifies the client certificate? This option protects against certificates manual made with a fake public-private key pair? So can someoane make a certificate identical with the original, attach another set of public and private keys and pretend to be someoane else? Thank you --- This email has been checked for viruses by Avast antivirus software. https://www.avast.com/antivirus --------=_MB52D21C19-8A60-45AC-BB39-736050B2634C Content-Type: text/html; charset=utf-8 Content-Transfer-Encoding: quoted-printable
Hello
 
I have a web page that asks for client certificate.
These are the options for this:
 
SSLVerifyClient require
SSLVerifyDepth 10

How does SSLVerifyClient  verif= ies the client certificate?
This option protects against certificates manual made with a fake publ= ic-private key pair?
So can someoane make a certificate identical with the original, a= ttach another set of public and private keys and pretend to be someoane els= e?
 
Thank you



3D"Avast

This email has been checked for viruses by Avast antivirus software.
www.avast.com



=

DISCLAIMER:
Acest mesaj de posta electronica si documentele aferente sunt confidentiale. Este interzisa distribuirea, dezvaluirea sau orice alt mod de utilizare a lor. Daca nu sunteti destinatarul acestui mesaj, este interzis sa actionati in baza acestor informatii. Citirea, copierea, distribuirea, dezvaluirea sau utilizarea in alt mod a informatiei continute in acest mesaj constituie o incalcare a legii. Daca ati primit mesajul din greseala, va rugam sa il distrugeti, anuntand expeditorul de eroarea comisa. Intrucat nu poate fi garantat faptul ca posta electronica este un mod sigur si lipsit de erori de transmitere a informatiilor, este responsabilitatea dvs. sa va asigurati ca mesajul (inclusiv documentele alaturate lui) este validat si autorizat spre a fi utilizat in mediul dvs.


= --------=_MB52D21C19-8A60-45AC-BB39-736050B2634C--