On Fri, May 24, 2002 at 10:14:40AM -0600, Joel Daniels wrote: > >From what I understand Ephemeral Keys will keep someone who steals my > private key from being able to decrypt my SSL communication. He can still > use a man-in-the-middle attack of course. > > The SSL_CTX_set_options documentation says: > > SSL_OP_EPHEMERAL_RSA > > Always use ephemeral (temporary) RSA key when doing RSA operations (see > SSL_CTX_set_tmp_rsa_callback(3)). According to the specifications this is > only done, when a RSA key can only be used for signature operations (namely > under export ciphers with restricted RSA keylength). By setting this option, > ephemeral RSA keys are always used. This option breaks compatibility with > the SSL/TLS specifications and may lead to interoperability problems with > clients and should therefore never be used. Ciphers with EDH (ephemeral > Diffie-Hellman) key exchange should be used instead. > > I however am developing both the client and the server, are there any > reasons why I should use Ephemeral RSA vs. Ephemeral DH? > > Also are there any reasons why I should not use Ephemeral Keys period?
Ephemeral key improve your security due to the provided forward secrecy you already mention. It becomes impossible for an attacker to decrypt past communication. Future communication also stay secure as long as the attacker can only listen. Mounting a man-in-the-middle attack may not be too difficult, but the risk of being detected is far higher than it is when just eavesdropping. The price is a performance penalty. For a discussion of ephemeral RSA vs. ephemeral DH: I don't know. When switching from SSH-1 to SSH-2, RSA session keys were replaced with DH ones, but that may have been for patent reasons. Maybe somebody else can spread mor light on this point. Best regards, Lutz -- Lutz Jaenicke [EMAIL PROTECTED] http://www.aet.TU-Cottbus.DE/personen/jaenicke/ BTU Cottbus, Allgemeine Elektrotechnik Universitaetsplatz 3-4, D-03044 Cottbus ______________________________________________________________________ OpenSSL Project http://www.openssl.org User Support Mailing List [EMAIL PROTECTED] Automated List Manager [EMAIL PROTECTED]