> NO, Rich is making a mistake, ADH is ephemeral of necessity, since without
> long-term keys in certificates it is impossible to use long-term keys whose
> disclosure might later compromise confidentiality.
Except that your code can always use the same keypair if it screws up the
callback.
Yes, it's only required on the server.
Norm Green
On 5/25/16 14:10, Jeremy Farrell wrote:
Interesting; is this a server-side requirement? I ask because with
1.0.2g my client using "AECDH+AES:ADH+AES" makes a TLS 1.2 connection
with AECDH-AES256-SHA without calling this function or similar.
Interesting; is this a server-side requirement? I ask because with
1.0.2g my client using "AECDH+AES:ADH+AES" makes a TLS 1.2 connection
with AECDH-AES256-SHA without calling this function or similar.
Regards,
jjf
On 25/05/2016 21:31, Norm Green wrote:
Yes! That was
On Tue, May 24, 2016 at 05:45:56PM +, Salz, Rich wrote:
> > >./openssl ciphers -v 'ALL:aNULL' |grep ECDH |grep "Au=None"
> > AECDH-AES256-SHASSLv3 Kx=ECDH Au=None Enc=AES(256) Mac=SHA1
> > AECDH-AES128-SHASSLv3 Kx=ECDH Au=None Enc=AES(128) Mac=SHA1
> > AECDH-RC4-SHA
On Tue, May 24, 2016 at 05:08:38PM +, Salz, Rich wrote:
> > 2) Are the same encryption keys used every time with ADH?
>
> Yes. That's the other BIG reason :) You really want ephemeral, and
> therefore ECDH
NO, Rich is making a mistake, ADH is ephemeral of necessity, since
without
Yes! That was the problem. In order to use cipher "AECDH",
SSL_CTX_set_ecdh_auto(ctx, 1) must be called first.
Thanks Michael!!
Norm
On 5/24/16 15:52, Michael Wojcik wrote:
From: openssl-users [mailto:openssl-users-boun...@openssl.org] On Behalf
Of Norm Green
Sent: Tuesday, May 24, 2016
> From: openssl-users [mailto:openssl-users-boun...@openssl.org] On Behalf
> Of Norm Green
> Sent: Tuesday, May 24, 2016 13:40
>
> I've tried both:
>
> SSL_CTX_set_cipher_list("AECDH")
>
> and:
>
> SSL_CTX_set_cipher_list("AECDH-AES256-SHA")
>
> on both the client and server side, both of
> Any suggestions on how to proceed?
Sorry, no.
--
openssl-users mailing list
To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-users
I've tried both:
SSL_CTX_set_cipher_list("AECDH")
and:
SSL_CTX_set_cipher_list("AECDH-AES256-SHA")
on both the client and server side, both of which result in the dreaded
"no shared cipher" error:
error:1408A0C1:SSL routines:ssl3_get_client_hello:no shared
cipher:s3_srvr.c:1417:
The
> >./openssl ciphers -v 'ALL:aNULL' |grep ECDH |grep "Au=None"
> AECDH-AES256-SHASSLv3 Kx=ECDH Au=None Enc=AES(256) Mac=SHA1
> AECDH-AES128-SHASSLv3 Kx=ECDH Au=None Enc=AES(128) Mac=SHA1
> AECDH-RC4-SHA SSLv3 Kx=ECDH Au=None Enc=RC4(128) Mac=SHA1
>
Thanks Rich. More newbie questions.
Looking at the available ciphers I see this:
>./openssl ciphers -v 'ALL:aNULL' |grep ECDH |grep "Au=None"
AECDH-AES256-SHASSLv3 Kx=ECDH Au=None Enc=AES(256) Mac=SHA1
AECDH-AES128-SHASSLv3 Kx=ECDH Au=None Enc=AES(128) Mac=SHA1
> 1) The wiki says don't use ADH, presumably because ADH provides
> encryption but not authentication and is exposed to man in the middle
> attacks. Is that the only reason?
Use ECDH, it's less expensive computationally.
> 2) Are the same encryption keys used every time with ADH?
Yes. That's
12 matches
Mail list logo