Dear Joerg,

it would be interesting to learn the reason to consider ssltest insecure.

As I read it, DH parameters (modulus and generator) are set to
some well-known values. This is required to use the same group,
both by server and client. Security of DH key exchange is determined by
DH private keys and SSL3 server code would call DH_generate_key()
to set it random. That is, security stands on good randomness source,
exactly as it should be. Well, this analysis is pretty simple
for SSL_OP_SINGLE_DH_USE option set.

Did I miss something?

regards,
Vadim

On Tue, Aug 13, 2002 at 04:01:31PM +0200, Joerg Bartholdt wrote:
> Innokentiy Ivanov wrote:
> 
> >Good afternoon!
> >
> >Can anybody help me, please? 
> >What shell i do to use ciphers with DH/DH-anon key exchange algorithms?
> >
> >When i try to connect to OpenSSL server with only cipher DH_..._..._... or
> >DH_anon_..._..._..., it says: "no shared cipher".
> >
> >Please, help me to do this. Maybe, OpenSSL doesn't support DH/DHa at all?
> >
> OpenSSL supports DH, but to use it, you must setup some key material 
> (which is more or less timeconsuming).
> Either you use the setup-routine DH_generate_parameters() and 
> SSL_CTX_set_tmp_dh() or use fixed key material as seen in ssl/ssltest.c 
> (fast, but insecure).
> 
> Jo"rg
> 
> ______________________________________________________________________
> OpenSSL Project                                 http://www.openssl.org
> User Support Mailing List                    [EMAIL PROTECTED]
> Automated List Manager                           [EMAIL PROTECTED]

-- 
Naina library: http://www.unity.net/~vf/naina_r1.tgz
______________________________________________________________________
OpenSSL Project                                 http://www.openssl.org
User Support Mailing List                    [EMAIL PROTECTED]
Automated List Manager                           [EMAIL PROTECTED]

Reply via email to