The Illustrated Network- P63:In this chapter, you will learn about the protocol stack used on the global public Internet and how these protocols have been evolving in today’s world. We’ll review some key basic defi nitions and see the network used to illustrate all of the examples in this book, as well as the packet content, the role that hosts and routers play on the network, and how graphic user and command line interfaces (GUI and CLI, respectively) both are used to interact with devices. | CHAPTER 23 Securing Sockets with SSL 589 Most people choose not to see this warning over and over and click the box but it s good to see that the browser knows that it s going to establish a secure connection. If we okay the operation the first thing that is noticeable is how much slower the server is to respond compared to the regular default Web page display which is just about instantaneous because the two hosts are on the same LAN. Of course the bsdserver is not the fastest platform or the platform of choice for commercial Web site hosting. A lot is going on between server and client but eventually the browser receives the site certificate and in this case immediately objects to the certificate provided by bsdserver. This is shown in Figure . The certificate must pass three major tests and the certificate used for testing OpenSSL with Apache is wanting in all three categories. First the issuing company does not exist. Second the certificate has expired. Third the name on the certificate has nothing to do with bsdserver. The user can view the certificate and ultimately decide to proceed or essentially abort the request for the page. If we view the certificate used for testing in Apache SSL the reasons for the warnings become obvious as shown in Figure . The testing certificate issued by the nonexistent Snake Oil CA not only expired long ago but is issued to a bogus domain. Nevertheless the user can choose to view the FIGURE Apache SSL test certificate which fails on all three counts. 590 PART IV Application Level FIGURE The secure Web page and lock IE 7 moves it to the top of the page . Note the use of https. details of the certificate fields optionally store a copy of the certificate on the client or choose to proceed users cannot say they have not been warned . Clicking on OK finally after another longish wait delivers the secure Web page and displays the familiar browser secure lock in the lower right-hand corner of the window. We haven t .