You are not logged in.
A machine named clientmachine had a self signed openssl server certificate at user@clientmachine:~. That certificate was used by user@clientmachine, with a specifically tailored client, for a short term connection to the server. The connection was made with a dedicated application. It is not the usual https clients, nor other familiar applications. Afterwards, user@clientmachine issued
openssl s_client -connect server
It was evident the right self signed certificate was used by this command, even though the certificate was never stored manually by the administrator anywhere beside user@clientmachine:~.
Edit: the following is wrong, so it is overstroked. I was wrong claiming the certificate is saved anywhere beside user@clientmachine:~. Turns out that just like the usual https process, the server sent its certificate while secure connection is created. Or am I wrong that sending the server certificate at that time is the usual process?
As if the dedicated client application, or the openssl library, copied the certificate to other places in the client machine, where openssl looked for it. In that case, where, on the clientmachine, the certificate is stored?
Last edited by regid (2019-06-09 19:49:27)
powerofforreboot.efi (AUR): Utilities to be used from within a UEFI boot manager or shell.
Offline
On Arch Linux the OPENSSLDIR is /etc/ssl.
/etc/ssl/certs seems a good starting point to look.
Disliking systemd intensely, but not satisfied with alternatives so focusing on taming systemd.
clean chroot building not flexible enough ?
Try clean chroot manager by graysky
Offline