Forums before death by AOL, social media and spammers... "We can't have nice things"
|    comp.dcom.vpn    |    VPN protocols, clients, awesomeness    |    2,349 messages    |
[   << oldest   |   < older   |   list   |   newer >   |   newest >>   ]
|    Message 902 of 2,349    |
|    Larry Riffle to Mitja Sladovic    |
|    Re: FreeSwan and certificates    |
|    09 Apr 04 14:35:09    |
      From: spamtrap47@adelphia.net              pkcs12/pfx is an import format containing a cert and its private key       along with zero or more other certs and CA's. Thats how you'd transport       a cert and private key between clients.              pkcs7 is one of several cert formats. I guess this is their CA?              If I'm understanding you right you want to authenticate your customer's       connection and the cert they will present is signed by their CA. If       that's the case all your end needs is their CA. Their end needs yours.       No reason to exchange certs and ABSOLUTELY NO reason to exchange private       keys. (That's why they call them "private".)              If they sent you a pkcs12 file containing their private key that's a       huge no-no. If they have made a habit out of that they should throw out       their cert and CA and start over. Security is compromised. Well actually       its flushed down the toilet. I hope I've misunderstood.              The authentication process works like this. Their end presents its cert       and trust chain up to, but not including, the CA. If your end has a CA       to complete the chain, they are in. Same thing with your cert in the       other direction. Private keys remain private.              Mitja Sladovic wrote:       > Hi       >       > I have Linux FreeS/WAN super-freeswan-1.99.8 with X509 patch on server side,       > with working WinXP native IPSEC connections (where i'm CA).       >       > Now I want to add cert to freeswan from custumer, where he is a CA.       > He gives me cert.pfx and cert-ca.p7b (CA Cert).       >       > So i converted those certs in PEM format:       > Private cert:       > openssl pkcs12 -in cert.pfx -out cert_pem.pem       > openssl rsa -in cert_pem.pem -out cert.pem # to remove password       >       > CA cert:       > openssl pkcs7 -inform DER -in cert-ca.p7b -print_certs -text -out cert-ca.pem       >       > I configured ipsec.conf:       > conn customer       > left=(my IP)       > leftsubnet=192.168.1.0/24       > leftcert=/etc/ipsec.d/cert.pem       > right=(Customer's IP)       > rightsubnet=10.0.10.0/24       > rightcert=/etc/ipsec.d/cert-ca.pem       > rightca=%same       > pfs=yes       > auto=start       >       >       > Is certificate convertion process OK?       > IS ipsec.conf configuration OK?       > What should I define in ipsec.secrets?       >       > Thanks a lot!!!              --- SoupGate-Win32 v1.05        * Origin: you cannot sedate... all the things you hate (1:229/2)    |
[   << oldest   |   < older   |   list   |   newer >   |   newest >>   ]
(c) 1994, bbs@darkrealms.ca