summaryrefslogtreecommitdiff
diff options
context:
space:
mode:
authorNikos Mavrogiannopoulos <nmav@gnutls.org>2013-05-05 18:52:05 +0300
committerNikos Mavrogiannopoulos <nmav@gnutls.org>2013-05-05 18:52:05 +0300
commit6a5d934738b248b9cbcdd8266ce6d264dbedca41 (patch)
treee09272f78cf156fd4a331da9cd48bad46d77aba6
parent475177631c50283c647efec1a5445b734cd7f751 (diff)
downloadgnutls-6a5d934738b248b9cbcdd8266ce6d264dbedca41.tar.gz
doc update
-rw-r--r--doc/cha-auth.texi11
1 files changed, 7 insertions, 4 deletions
diff --git a/doc/cha-auth.texi b/doc/cha-auth.texi
index d2f15063e2..4079985307 100644
--- a/doc/cha-auth.texi
+++ b/doc/cha-auth.texi
@@ -82,12 +82,15 @@ connection other channels over the Internet may be used, e.g., @acronym{DNSSEC}
@subsection Two peers and a trusted third party
-When a trusted third party is available the most suitable option is to use
+When a trusted third party is available (or a certificate authority)
+the most suitable option is to use
certificate authentication (see @ref{Certificate authentication}).
The client and the server obtain certificates that associate their identity
-and public keys in a reliable way and use them to on the subsequent
-communications with each other. Each party verifies the peer's certificate
-using the trusted third party's certificate.
+and public keys using a digital signature by the trusted party and use
+them to on the subsequent communications with each other.
+Each party verifies the peer's certificate using the trusted third party's
+signature. The parameters of the third party's signature are present
+in its certificate which must be available to all communicating parties.
While the above is the typical authentication method for servers in the
Internet by using the commercial CAs, the users that act as clients in the