[pyar] Auth entre servidor / cliente usando https y evitar robo de info en el medio ...

Emiliano Dalla Verde Marcozzi edvm en airtrack.com.ar
Mar Ene 18 10:39:41 ART 2011


El 18 de enero de 2011 10:22, Roberto Alsina
<ralsina en netmanagers.com.ar>escribió:

> Una solución "sencilla" (já) es usar Pound: http://www.apsis.ch/pound/


Gracias Roberto, pinta muy bien! pero me tiro un poco abajo esto ...

If a client browser connects via HTTPS and if it presents a certificate and
if HTTPSHeaders is set, *Pound* will obtain the certificate data and add the
following HTTP headers to the request it makes to the server:

   - X-SSL-Subject: information about the certificate owner
   - X-SSL-Issuer: information about the certificate issuer (CA)
   - X-SSL-notBefore: begin validity date for the certificate
   - X-SSL-notAfter: end validity date for the certificate
   - X-SSL-serial: certificate serial number (in decimal)
   - X-SSL-cipher: the cipher currently in use
   - X-SSL-certificate: the full client certificate (multi-line)

 It is the application's responsibility to actually use these headers - *
Pound* just passes this information without checking it in any way (except
for signature and encryption correctness).
Please note that this mechanism allows forgeries: a client may (maliciously)
send these headers to *Pound* in order to masquerade as an SSL client with a
specific certificate.

-- 
*Emiliano Dalla Verde Marcozzi*
Encargado de IT y Python Ninja Developer



San Juan 4879
Rosario. Argentina
Tel. (+54) 341 437 6878
www.airtrack.com.ar

"Chuck Norris doesn't need a debugger, he just stares down the bug until the
code confesses."
------------ próxima parte ------------
Se ha borrado un adjunto en formato HTML...
URL: <http://listas.python.org.ar/pipermail/pyar/attachments/20110118/3f0b79ad/attachment.html>


More information about the pyar mailing list