On Tue, May 19, 2009 at 09:44:23AM +0530, Neetu Agrawal wrote:

> Thanks for suggestion but may be i didnt put my query in right way . I want
> that client initiate the request and server listen the request but the
> roles  of server and client get exchanged during the key genration to
> offload the server from key decryption operation.

That is not the SSL protocol. Feel free to invent, implement and
popularize your own protocol. The key exchange algorithms in OpenSSL are:

        - RSA key exchange (server decrypts key)        kRSA
        - ephemeral Diffie-Hellman key exchange         kEDH
        - ephemeral elliptic-curve DH key exchange      kEECDH
        - ECDHe and ECDHr "fixed" DH variants           kECDH

In practice most clients you do not control (i.e. Windows desktops)
will only support these two ciphers:

    RC4-SHA                 SSLv3 Kx=RSA      Au=RSA  Enc=RC4(128)  Mac=SHA1
    RC4-MD5                 SSLv3 Kx=RSA      Au=RSA  Enc=RC4(128)  Mac=MD5

If you control the clients, you probably don't need to defend yourself
against server CPU DoS. What is the real problem you are trying to solve?

-- 
        Viktor.
______________________________________________________________________
OpenSSL Project                                 http://www.openssl.org
User Support Mailing List                    openssl-users@openssl.org
Automated List Manager                           majord...@openssl.org

Reply via email to