I'm interested in how a x509 certificate is validated by a client step by step. Let's imagine that a web server and a client wanna talk to each other using secure connection:
- Client asks a server for a secure connection
- A server exposes its certificate to a client
- A client generates an one-time-session encrypted key
- Start session...
Are these steps somewhat right?
The actual question is How a client actually can trust the certificate (what fields it verifies with what, does it verify some serial numbers, signatures or issuers, etc?)