I wondering how self-signed certificates generally getting checked in a SSL connection establishment.
Let's have a look on the self-signed certificates:
client and server providing a
self-signed certificatewith its private key (created with OpenSSL e.g.)when the
serverreceiving the"ClientHello"message from theclient, he is transmitting his certificate to the client.- The
ServerHelloDonemessage is sent to the client, then the client needs to verify the certificate.
When the client is receiving the server certificate, what are his steps to verify this certificate?
I know that self-signed certificates generally shouldn't be used in fact that there is no third-party instance (CA) to check against.
Does the client just accepting the server certificate without any further steps or does the client already provide a server "root" certificate before the connection getting established?
CertificateVerifymessage is only used for client-certificate authentication, nothing to do with verifying the server cert. - BrunoCertificateVerifymessage ;-) and thanks for your advice. - Leviathan