[pkix] Certificates used between two processes on same server

Joel Kazin <joel.kazin1@verizon.net> Tue, 03 April 2018 15:51 UTC

Return-Path: <joel.kazin1@verizon.net>
X-Original-To: pkix@ietfa.amsl.com
Delivered-To: pkix@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 4C41112AAB6 for <pkix@ietfa.amsl.com>; Tue, 3 Apr 2018 08:51:26 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.901
X-Spam-Level:
X-Spam-Status: No, score=-1.901 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_NONE=-0.0001, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 9TSXTl_uhnbH for <pkix@ietfa.amsl.com>; Tue, 3 Apr 2018 08:51:25 -0700 (PDT)
Received: from omr-a005e.mx.aol.com (omr-a005e.mx.aol.com [204.29.186.50]) (using TLSv1 with cipher ADH-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id E0A7812895E for <pkix@ietf.org>; Tue, 3 Apr 2018 08:51:24 -0700 (PDT)
Received: from mtaout-mae01.mx.aol.com (mtaout-mae01.mx.aol.com [172.26.254.141]) by omr-a005e.mx.aol.com (Outbound Mail Relay) with ESMTP id 0CCC53800054 for <pkix@ietf.org>; Tue, 3 Apr 2018 11:51:24 -0400 (EDT)
Received: from [192.168.1.3] (0x5b3139322e3136382e312e335d [68.129.130.72]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mtaout-mae01.mx.aol.com (MUA/Third Party Client Interface) with ESMTPSA id D37543800008D for <pkix@ietf.org>; Tue, 3 Apr 2018 11:51:23 -0400 (EDT)
To: pkix@ietf.org
Reply-To: joel.kazin1@verizon.net
From: Joel Kazin <joel.kazin1@verizon.net>
Message-ID: <d329e6e1-6541-4bbd-3c80-f8e8f212febb@verizon.net>
Date: Tue, 3 Apr 2018 11:51:14 -0400
User-Agent: Mozilla/5.0 (Windows NT 6.0; rv:52.0) Gecko/20100101 Thunderbird/52.6.0
MIME-Version: 1.0
Content-Type: text/plain; charset=utf-8; format=flowed
Content-Transfer-Encoding: 7bit
Content-Language: en-US
x-aol-global-disposition: G
x-aol-sid: 3039ac1afe8d5ac3a2fb2588
X-AOL-IP: 68.129.130.72
Archived-At: <https://mailarchive.ietf.org/arch/msg/pkix/MDSGF-On-Eod1vb7FXlpSuuutls>
Subject: [pkix] Certificates used between two processes on same server
X-BeenThere: pkix@ietf.org
X-Mailman-Version: 2.1.22
Precedence: list
List-Id: PKIX Working Group <pkix.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/pkix>, <mailto:pkix-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/pkix/>
List-Post: <mailto:pkix@ietf.org>
List-Help: <mailto:pkix-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/pkix>, <mailto:pkix-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 03 Apr 2018 15:51:26 -0000

I have a requirement where two process on the same Windows server need 
to communicate with each other over a secure channel. It's mot just one 
server but many servers running the same pair of applications. What type 
of certificate use have participants on the list seen? You can reply 
directly to me rather than the list.

Regards,

Joel