>From what I understand Ephemeral Keys will keep someone who steals my private key from being able to decrypt my SSL communication. He can still use a man-in-the-middle attack of course.
The SSL_CTX_set_options documentation says: SSL_OP_EPHEMERAL_RSA Always use ephemeral (temporary) RSA key when doing RSA operations (see SSL_CTX_set_tmp_rsa_callback(3)). According to the specifications this is only done, when a RSA key can only be used for signature operations (namely under export ciphers with restricted RSA keylength). By setting this option, ephemeral RSA keys are always used. This option breaks compatibility with the SSL/TLS specifications and may lead to interoperability problems with clients and should therefore never be used. Ciphers with EDH (ephemeral Diffie-Hellman) key exchange should be used instead. I however am developing both the client and the server, are there any reasons why I should use Ephemeral RSA vs. Ephemeral DH? Also are there any reasons why I should not use Ephemeral Keys period? - Joel Daniels ______________________________________________________________________ OpenSSL Project http://www.openssl.org User Support Mailing List [EMAIL PROTECTED] Automated List Manager [EMAIL PROTECTED]