Re: [openssl-users] Diffie-Hellman Questions

2016-05-25 Thread Salz, Rich
> NO, Rich is making a mistake, ADH is ephemeral of necessity, since without > long-term keys in certificates it is impossible to use long-term keys whose > disclosure might later compromise confidentiality. Except that your code can always use the same keypair if it screws up the callback.

Re: [openssl-users] Diffie-Hellman Questions

2016-05-25 Thread Norm Green
Yes, it's only required on the server. Norm Green On 5/25/16 14:10, Jeremy Farrell wrote: Interesting; is this a server-side requirement? I ask because with 1.0.2g my client using "AECDH+AES:ADH+AES" makes a TLS 1.2 connection with AECDH-AES256-SHA without calling this function or similar.

Re: [openssl-users] Diffie-Hellman Questions

2016-05-25 Thread Jeremy Farrell
Interesting; is this a server-side requirement? I ask because with 1.0.2g my client using "AECDH+AES:ADH+AES" makes a TLS 1.2 connection with AECDH-AES256-SHA without calling this function or similar. Regards, jjf On 25/05/2016 21:31, Norm Green wrote: Yes! That was

Re: [openssl-users] Diffie-Hellman Questions

2016-05-25 Thread Viktor Dukhovni
On Tue, May 24, 2016 at 05:45:56PM +, Salz, Rich wrote: > > >./openssl ciphers -v 'ALL:aNULL' |grep ECDH |grep "Au=None" > > AECDH-AES256-SHASSLv3 Kx=ECDH Au=None Enc=AES(256) Mac=SHA1 > > AECDH-AES128-SHASSLv3 Kx=ECDH Au=None Enc=AES(128) Mac=SHA1 > > AECDH-RC4-SHA

Re: [openssl-users] Diffie-Hellman Questions

2016-05-25 Thread Viktor Dukhovni
On Tue, May 24, 2016 at 05:08:38PM +, Salz, Rich wrote: > > 2) Are the same encryption keys used every time with ADH? > > Yes. That's the other BIG reason :) You really want ephemeral, and > therefore ECDH NO, Rich is making a mistake, ADH is ephemeral of necessity, since without

Re: [openssl-users] Diffie-Hellman Questions

2016-05-25 Thread Norm Green
Yes! That was the problem. In order to use cipher "AECDH", SSL_CTX_set_ecdh_auto(ctx, 1) must be called first. Thanks Michael!! Norm On 5/24/16 15:52, Michael Wojcik wrote: From: openssl-users [mailto:openssl-users-boun...@openssl.org] On Behalf Of Norm Green Sent: Tuesday, May 24, 2016

Re: [openssl-users] Diffie-Hellman Questions

2016-05-24 Thread Michael Wojcik
> From: openssl-users [mailto:openssl-users-boun...@openssl.org] On Behalf > Of Norm Green > Sent: Tuesday, May 24, 2016 13:40 > > I've tried both: > > SSL_CTX_set_cipher_list("AECDH") > > and: > > SSL_CTX_set_cipher_list("AECDH-AES256-SHA") > > on both the client and server side, both of

Re: [openssl-users] Diffie-Hellman Questions

2016-05-24 Thread Salz, Rich
> Any suggestions on how to proceed? Sorry, no. -- openssl-users mailing list To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-users

Re: [openssl-users] Diffie-Hellman Questions

2016-05-24 Thread Norm Green
I've tried both: SSL_CTX_set_cipher_list("AECDH") and: SSL_CTX_set_cipher_list("AECDH-AES256-SHA") on both the client and server side, both of which result in the dreaded "no shared cipher" error: error:1408A0C1:SSL routines:ssl3_get_client_hello:no shared cipher:s3_srvr.c:1417: The

Re: [openssl-users] Diffie-Hellman Questions

2016-05-24 Thread Salz, Rich
> >./openssl ciphers -v 'ALL:aNULL' |grep ECDH |grep "Au=None" > AECDH-AES256-SHASSLv3 Kx=ECDH Au=None Enc=AES(256) Mac=SHA1 > AECDH-AES128-SHASSLv3 Kx=ECDH Au=None Enc=AES(128) Mac=SHA1 > AECDH-RC4-SHA SSLv3 Kx=ECDH Au=None Enc=RC4(128) Mac=SHA1 >

Re: [openssl-users] Diffie-Hellman Questions

2016-05-24 Thread Norm Green
Thanks Rich. More newbie questions. Looking at the available ciphers I see this: >./openssl ciphers -v 'ALL:aNULL' |grep ECDH |grep "Au=None" AECDH-AES256-SHASSLv3 Kx=ECDH Au=None Enc=AES(256) Mac=SHA1 AECDH-AES128-SHASSLv3 Kx=ECDH Au=None Enc=AES(128) Mac=SHA1

Re: [openssl-users] Diffie-Hellman Questions

2016-05-24 Thread Salz, Rich
> 1) The wiki says don't use ADH, presumably because ADH provides > encryption but not authentication and is exposed to man in the middle > attacks. Is that the only reason? Use ECDH, it's less expensive computationally. > 2) Are the same encryption keys used every time with ADH? Yes. That's