[openssl-users] regarding automating certificate management process

2016-06-12 Thread R-D intern
Hello, I have implemented ssl for tcp ad HTTP as well i.e ssl security for tcp ad http servers. I have created self- signed certificate for CA and server and client certificates using the self- signed CA certificate.But I would like to know the process of automating certificate

[openssl-users] regarding automating certificate management process

2016-06-12 Thread R-D intern
Hello, I have implemented ssl for tcp ad HTTP as well i.e ssl security for tcp ad http servers. I have created self- signed certificate for CA and server and client certificates using the self- signed CA certificate.But I would like to know the process of automating certificate management

[openssl-users] regarding ssl_server test

2016-05-26 Thread R-D intern
. How can such a thing be tested for a server listening over private ip? Please help. Awaiting response. Regards, R-D Intern -- View this message in context: http://openssl.6102.n7.nabble.com/regarding-ssl-server-test-tp66354.html Sent from the OpenSSL - User mailing list archive at Nabble.com

Re: [openssl-users] regarding ssl_server test

2016-05-27 Thread R-D intern
Thank you so much.I tried searching for a downloadable ssl_server test source code for internal servers but couldn't get any.how could I get one? Thanks and regards, R-D Intern -- View this message in context: http://openssl.6102.n7.nabble.com/regarding-ssl-server-test-tp66354p66400.html

Re: [openssl-users] regarding SSL security

2016-02-12 Thread R-D intern
Thank you a lot, Jakob.I understood your answers and am quite satisfied too that the replies sound conceptually right. But it would be kind on your part if you answer some questions further. 1. Regarding question 3, I am using openssl 1.0.2e which supports named curve. Such a question had earlier

[openssl-users] regarding SSL security

2016-02-11 Thread R-D intern
Hello , I am a Masters student and currently working on a project related to security. I have certain queries regarding ssl security. It would be of great use to me if some of my queries get clarified. The following is listed as: 1. How do I prove that ECC 256 bit key is equivalently

[openssl-users] regarding openssl 1.0.2e

2016-01-19 Thread R-D intern
Hello, I am trying with SSL handshake mechanism with ECDSA-ECDHE-AES-SHA and have generated certificates following the below link. http://this.is.thoughtcrime.org.nz/elliptic-curve-ca-guide But have certain issues regarding the same. 1. The generated certificates show "The

[openssl-users] different encrypted text for the same plain text message

2016-07-28 Thread R-D intern
Hello, I am using ECDSA-ECDHE-AES-SHA cipher suite for client -server security.I tried understanding the mechanism handshake mechanism. What still quizzes me is ; communication between a specific client -server for a specific session generates different encrypted text for the same plain text

[openssl-users] server key exchange use case in ECDSA-ECDHE-AES-SHA

2016-07-28 Thread R-D intern
Hello, I have used ECDSA-ECDHE-AES-SHA as the cipher suite in my client- server communication. To use ECDHE key exchange algorithm I used ECDHE parameters and what I see is an additional server key exchange in my SSL handshake process. What does that imply? Does that increase the security

Re: [openssl-users] different encrypted text for the same plain text message

2016-07-29 Thread R-D intern
Hello Benjamin, Thanks for the reply. I know the purpose and benefit of creating different cipher texts of the same corresponding plain text.But I would like to know about the places where this randomness gets introduced to create different encrypted texts.Because SSL handshake takes place only

Re: [openssl-users] different encrypted text for the same plain text message

2016-07-29 Thread R-D intern
Thank you, Jakob. I had read that the earlier versions IV logic used to use the last block of the ciphertext as the IV for the next message and this proved vulnerable giving way to reflection attacks. But is it only the IV that changes? the bulk encryption and MAC keys remain constant throughput

Re: [openssl-users] server key exchange use case in ECDSA-ECDHE-AES-SHA

2016-07-29 Thread R-D intern
Thanks Salz for the reply. I do understand the server key exchange is used to involve even the server in the key exchange process to send the ECDHE public key with the EC domain parameters so that the client creates the ECDHE public key and the pre master secret. But even if there is no server key

Re: [openssl-users] different encrypted text for the same plain text message

2016-07-30 Thread R-D intern
Thank you, Stephen. You answered regarding randomness in different sessions if session resumption is on. But my question revolves around the same messages within the same Session. How different encrypted texts are formed of the same plaintext between a client -server? Is it only the iv changes