On Fri, May 30, 2003, I (Charles B Cranston) wrote:

I'm using 2048 bit certs with IE 5 and 6 and NS 4.72, 6.0,
and 7.2 -- there is a sort of compatability problem with
export-quality browsers, which can sometimes be addressed
at the SERVER (apache, give it more randomness).  This
confused me also.


Dr. Stephen Henson wrote:

The reason for that is that none-export ciphersuites on the server side
only generate the server random value which is sent in the clear and the PRNG
doesn't need to be seeded.

The client side needs to generate the pre-master secret so this does need a
seeded PRNG.

For export cipher suites the server needs to generate a temporary RSA key if
the server key is above a certain size. This limit is 512 bits for some and
1024 bits for other export cipher suites. This also needs a seeded PRNG.

Yes, this was our experience -- first we arranged for the PRNG on the server to be adequately seeded, and the problem went away. Later we upgraded the server OS to Solaris 2.8 with the /dev/urandom patch so the PRNG can get a good seeding without any extra effort.

The important observation is that this potentially uncontrolled
variable can easily confound experimentation to find out if 2048 bit certificates "work" or not.


--
Charles B (Ben) Cranston
mailto: [EMAIL PROTECTED]
http://www.wam.umd.edu/~zben

______________________________________________________________________
OpenSSL Project                                 http://www.openssl.org
User Support Mailing List                    [EMAIL PROTECTED]
Automated List Manager                           [EMAIL PROTECTED]

Reply via email to