Hello,

I am developing a secure HTTP web proxy server using
OpenSSL 0.9.6d.  It supports SSL/TLS on both client
and server sides.  I have already implemented the
basic secure connection and authentication functions
using examples found in OpenSSL books.

I am not a security expert, and my customer is asking
the following questions:

1) What is the key-length of the symmetric and
assymetric encryption for the TLS1.0 and SSL3.0
protocols?  It should be the following:

"TLS 1.0 as described in [RFC2246] must support 128bit
and 1024 key length for symmetric and asymmetric
encryption respectively."

"SSL3.0 as described in [SSL] must support 128bit and
1024 key length for symmetric and asymmetric
encryption respectively."
 
2) Is this key-length directly related to the
algorithms used (RC4, 3DES, AES)?
 
3) What is passed in its CLIENT_HELLO message during
the SSL-handshake:  the different supported
algorithms, the different key-lengths, ...

For question #1, I would expect that OpenSSL indeed
supports the requirements in RFC2246.

Question #2 is probably "yes" as well.

For #3, my code is not modifying the cipher suites in
the SSL context, so the answer might be whatever
"openssl ciphers" prints out:

"EDH-RSA-DES-CBC3-SHA:EDH-DSS-DES-CBC3-SHA:.... etc."

Thanks for any comments,

-David



                
____________________________________________________ 
Yahoo! Sports 
Rekindle the Rivalries. Sign up for Fantasy Football 
http://football.fantasysports.yahoo.com
______________________________________________________________________
OpenSSL Project                                 http://www.openssl.org
User Support Mailing List                    openssl-users@openssl.org
Automated List Manager                           [EMAIL PROTECTED]

Reply via email to