Hi Marek

1) Can I able to do both  EPHEMERAL RSA and DH EPHEMERAL same time ??
Will Openssl  call either EPHEMERAL RSA or  DH EPHEMERAL depend what
ciphers using ??

2) what do you mean some compatibility problem  ?? If SSSLv2 or SSLv3
try to connect my Server (TLS_RSA_WITH_3DES_EDE_CBC_SHA1) will my server
crash ??

3) I have core dump on SSL_CTX_free(ctx) ( I already check 
                                            { if (ctx)
                                              SSL_CTX_free(ctx);
                                            }

I have a SSL Server/Client application. Client can be independent or
come from Server.
If Client by itself,  SSL_CTX_free(ctx) will call when I am done with
Client.

For Server, I create one CTX. For Each Client's SSL connection, I
spin-off a thread and create SSL which share this CTX. Does openssl have
a counter to let me know there are still some SSL connection which
belong to this CTX before I call SSL_CTX_free(ctx). Something like this:

      if ( CTX_counter == 0)
       { if (ctx)
         SSL_CTX_free(ctx);
       }
Sorry to ask you many question. I just want to understand.

Thank You
Thao Dinh


 
-----Original Message-----
From: [EMAIL PROTECTED]
[mailto:[EMAIL PROTECTED] On Behalf Of Marek Marcola
Sent: Thursday, March 22, 2007 20:12
To: openssl-users@openssl.org
Subject: RE: Root Certificates dir

Hello,
> I asked you last week:
> > I have to interface with a client running  
> >TLS_RSA_WITH_3DES_EDE_CBC_SHA1. For me, it means:
> >..........
> > Please very my thought is correctly . DH is not involved at all ??? 
> >I  always think that DH have to be involved when using symmetric key.
> 
> You answered
> >Yes, in this case DH is not used.
> 
> I have a problem with what to do with Ephemeral keying. In openssl, It

> seem to me that I have two choices to use Ephemeral keying: temporary 
> RSA keys or Diffie_Hellman (DH) key agreement.
> 
> For temporary RSA keys, using something like:
> 
>   SSL_CTX_set_options(ctx,
> SSL_OP_ALL|SSL_OP_NO_SSLv2|SSL_OP_EPHEMERAL_RSA)
>   RSA *rsa;
>   > >       rsa=RSA_generate_key(512,RSA_F4,NULL,NULL);
>   > >       if (!SSL_CTX_set_tmp_rsa(SSL_context,rsa)){
>   > >               ExitPostmaster(1);
>   > >       }
>   > >       RSA_free(rsa);
> 
> For Diffie_Hellman (DH) , using something like:
>  
>   SSL_CTX_set_options(ctx,
> SSL_OP_ALL|SSL_OP_NO_SSLv2|SSL_OP_SINGLE_DH_USE)
>   SSL_CTX_set_tmp_dh_calback(...);
> 
> I can not use Diffie_Hellman (DH) key agreement because my
> TLS_RSA_WITH_3DES_EDE_CBC_SHA1 requirement. I can implement this but 
> it does not help because the DH is not used in this case.
> 
> I can not use temporary RSA keys because of: 
> 
> >Temporary RSA keys are only used in some export ciphersuites which 
> >are
> now obsolete. The use of ephemeral
> > RSA keys actually violates the standards in that particular
> ciphersuite.
> 
> 
> What else can I do to implement Ephemeral keying ??? Please help. I 
> have limited knowledge in this openssl.
Sorry for such late response.
As already Steve said that is some compatibility problem and if you can
live with that I do not see and problems.
In this case you are not inventing your own crypto protocol (which is
not easy and very dangerous) but you use some approved one.
Maybe for different purpose but may be useful and maybe in some feature
can be standard for example in TLS1.2 :-). Who knows.

Best regards,
--
Marek Marcola <[EMAIL PROTECTED]>

______________________________________________________________________
OpenSSL Project                                 http://www.openssl.org
User Support Mailing List                    openssl-users@openssl.org
Automated List Manager                           [EMAIL PROTECTED]
______________________________________________________________________
OpenSSL Project                                 http://www.openssl.org
User Support Mailing List                    openssl-users@openssl.org
Automated List Manager                           [EMAIL PROTECTED]

Reply via email to