"Grebelsky, Konstantin" wrote:

> I have the following problem: I have a server and client application. All I
> want to do is to secure (encrypt) the link (TCP/IP) between the
> applications. I want to be able to authenticate both parties upon connection
> using public key. I don't want to use certificates. The idea is that I'd
> authenticate the remote party using just public key.

But authentication is done with private keys...

> As far as I understood from different sources this is not possible without
> RSA since with DH we can not get public keys (limitations of SSLeay)? Thus
> either I have to pay RSA or I have to create or obtain certificates to use
> with DH because then I will be able to authenticate client and server
> without need to get and save actual public keys? 

DH public keys include the public DH parameters, which may be shared
among a group of users.  There are profiles for embedding DH parameters
in X.509 certs,  and while DH cannot be used to create digital
signatures (i.e. an authenticator which may be verified by any
third party),  there are methods of proof-of-possession of the
private key corresponding to a cert.  So, for pairwise auth or
encryption, you can use DH.

I have no idea how to do this in OpenSSL.

You still should sign certs with DSA or RSAwithMD5 or some such.

For using unsigned Diffie-Hellman certs, and the certificate discovery
protocol used in SKIP, see http://www.skip-vpn.org/
______________________________________________________________________
OpenSSL Project                                 http://www.openssl.org
User Support Mailing List                    [EMAIL PROTECTED]
Automated List Manager                           [EMAIL PROTECTED]

Reply via email to