The server also has a file containing its own public and private
keys, as well as the client's public key certificate. Recall
that public keys can be given out freely -- there's no need to hide
them from any other party.
It is important that each end of the client/server connection has only
the key files it needs to work properly. In particular, it's important
that only the server has a copy of its own private key. In the wrong hands,
this key could do much damage, since it would essentially allow a
malicious entity to cloak itself under the server's identity.
Now that you have an idea of how the whiteboard is put together,
we can begin working more directly with each of its components. In
the next section, you'll learn how to generate and manage
public/private key pairs in a client/server system.