I wondering how self-signed certificates generally getting checked in a SSL connection establishment.
Let's have a look on the self-signed certificates
:
client and server providing a
self-signed certificate
with its private key (created with OpenSSL e.g.)when the
server
receiving the"ClientHello"
message from theclient
, he is transmitting his certificate to the client.- The
ServerHelloDone
message is sent to the client, then the client needs to verify the certificate.
When the client is receiving the server certificate, what are his steps to verify this certificate?
I know that self-signed certificates generally shouldn't be used in fact that there is no third-party instance (CA)
to check against.
Does the client just accepting the server certificate without any further steps or does the client already provide a server "root" certificate before the connection getting established?
CertificateVerify
message is only used for client-certificate authentication, nothing to do with verifying the server cert. – BrunoCertificateVerify
message ;-) and thanks for your advice. – Leviathan