> 
> 
> 
> Matt Walsh wrote:
> > 
> > Hi All (esp SSL protocol experts).  Please help me to understand
> > something!
> > 
> > In short
> > --------
> > What triggers the key exchange during an SSL transaction?
> > 
> [SKE example deleted]
> 
> Well your example is probably related to US export versions of browsers.
> The old export regs restricted the size of RSA keys that could be used
> for key exchange to 512 bits. So if the certified server key (i.e. the
> one in the certificate) is larger then 512 bits and the client only
> supports export ciphers then a temporary RSA key is used which is signed
> by the server private key (the regs had no restrictions on signing with
> larger keys).
> 
> Later versions of the regulations allowed use of 1024 bit keys in 56 bit
> ciphersuites. Now of course there's no restriction.
> 
> So the clients in question are probably old export versions, newer
> versions shouldn't have this problem.

Does this mean newer clients won't even send the SSL_RSA_EXPORT_*
in the ClientHello handshake message?

Thanks,
Nagaraj
 
______________________________________________________________________
OpenSSL Project                                 http://www.openssl.org
User Support Mailing List                    [EMAIL PROTECTED]
Automated List Manager                           [EMAIL PROTECTED]

Reply via email to