> Hi, a question about the SSL:
>
> In SSL, the server certificate is checked by the
> client as to whether the server actually holds the
> private key of it. This is done by client sending the
> session key signed by server's public key.
>
> So, why there is a need for a check of domain name in
> the server certificate? Shouldn't the above check be
> enough?


Absolutely not. If I type "https://www.paypal.com" and I get connected to a
secure server run by some bad guys, knowing they own the certificate they
present to me isn't good enough. I need to make sure the certificate was
issued to paypal.com and signed by a certificate authority I trust.

Anyone can obtain a certificate and confirm that it is their certificate. If
the certificate is signed by a CA I trust, I then know who I am talking to.
But knowing I am talking to someone I don't trust, and still sending them my
credit card information, would be really stupid.

So it is imperative that a web browser verify that the certificate in fact
belongs to the organization the person using the web browser wants to talk
to.

DS


__________________________________________________ ____________________
OpenSSL Project http://www.openssl.org
User Support Mailing List openssl-users@openssl.org
Automated List Manager majordomo@openssl.org