On Fri, Jan 21, 2000 at 10:32:11AM +0100, [EMAIL PROTECTED] wrote:
> >>   In order to use DH-RSA-DES-CBC3-SHA or
> >>   DH-DSS-DES-CBC3-SHA ciphers, how can I:
> >> 
> >>   1. generate a private key?
> >>   2. request a CSR?
> >>   3. sign that CSR using demoCA?
> >
> >The EDH-RSA-DES-CBC3-SHA cipher is using ephemeral DH keys with RSA
> >authentication, so you can stay with the normal RSA keys you already
> >have(?).
> >Additionally, your code must have a temporary DH key available.
> >Based on the list of ciphers the client presents, the first cipher the
> >OpenSSL based server suppports is used.
> >If the EDH ciphers are listed early, they are used.
> 
> Thanks for your answer, but I don't know how to sign a DH parameters
> so it can be used for DH key exchange... (I am really a newbe :-)  )

You don't sign the DH parameters, they exist on their own.
For authentication you use the normal RSA certificates.
There are a lot of hints on creating your own certificates.
My own (simplistic) explanations are at
        http://www.aet.tu-cottbus.de/personen/jaenicke/postfix_tls

Best regards,
        Lutz
-- 
Lutz Jaenicke                             [EMAIL PROTECTED]
BTU Cottbus               http://www.aet.TU-Cottbus.DE/personen/jaenicke/
Lehrstuhl Allgemeine Elektrotechnik                  Tel. +49 355 69-4129
Universitaetsplatz 3-4, D-03044 Cottbus              Fax. +49 355 69-4153
______________________________________________________________________
OpenSSL Project                                 http://www.openssl.org
User Support Mailing List                    [EMAIL PROTECTED]
Automated List Manager                           [EMAIL PROTECTED]

Reply via email to