Brian Doyle <[EMAIL PROTECTED]> writes:
>     I have several questions regarding SSL connection initiation.  Thanks in
> advance for your help, this list is great!
> 
> They are:
> 
> a) How does a web browser (say Netscape) that does not want to concern the
> user with cryptographic details manage an RSA private key for the initiation
> of an SSL session?  I'm specifically interested in knowing whether it
> creates a key once and stores it on the disk, if it creates a key at startup
> and stores it for the lifetime of the process, or if it creates a key for
> each session.
The web browser doesn't need a private key in order to connect to servers
unless it's doing client authentication.
 
> b) What is the typical PRNG seeding process used by a web browser (again,
> say Netscape) when used on a machine that doesn't have /dev/random (e.g. A
> Macintosh)?
Well, OS X has /dev/random...

Anyway, the standard procedure is to try to find some unpredictable data
somewhere on the system, e.g. timing data, network usage, memory consumption,
screen snapshots, etc. None of this is what you'd call high grade randomness
but the hope is that when you mash it all together you get enough entropy...

> c) Does the server generate an ephemeral RSA private key for each SSL
> connection, or just once for the lifetime of the process which it uses
> across all clients?
Typically the latter, though some regenerate it on a time scale of hours
to days.

-Ekr

--
[Eric Rescorla                                   [EMAIL PROTECTED]]
Author of "SSL and TLS: Designing and Building Secure Systems"
                  http://www.rtfm.com/
  
______________________________________________________________________
OpenSSL Project                                 http://www.openssl.org
User Support Mailing List                    [EMAIL PROTECTED]
Automated List Manager                           [EMAIL PROTECTED]

Reply via email to