Thanks marek, I didnt know abt the R option on s_server.
Is it possible to make IE renegotiate? I have a rather complex testing
requirement and I cannot test using s_client, somehow I need to ensure the
client triggers renegotiation. I got a KB on IE

http://support.microsoft.com/kb/265369

and tried to introduce that symptom..but on XP its not happening..
Any suggestions as to how I can make IE trigger renegotiation once in
few minutes?

Thanks
--Gayathri


Hello,
> I would like to know as an ssl server, when do I send a "Hello
> request" on the wire? Based on what parameters should I trigger that?
> I have quite a few questions based on this
>
> A) Does the re-handshake happen on the existing tcp connection? i.e
> the tcp connection over which the "hello request" message is sent by
> the my server?
Yes.

> B) After the rehandshake is completed, does application data continue
> to flow in the same tcp connection but now with the new cipher parameters?
Yes.

> C) Does rehandhake involve public key operations as well? i.e does the
> premaster secret change?
Yes.
You can experiment with SSL renegotiation using openssl command.
Run in "server" window command:

$ openssl s_server -key vpn-server-key.pem -cert vpn-server-crt.pem -msg
-debug -cipher AES256-SHA -state

next, in "client" window run:

$ openssl s_client -msg -debug -state

and you will see proper SSL session established connection.

Now, in "server" windows type:

R<enter>

this will trigger renegotation, you will see a lot of messages and on
client side you will see client_key_exchange packet sent to server with
new pre_master_secret.

> I am really confused and I did spend sometime with the RFC, but I am
> really lost..I was thinking if I called the API :
> SSL_CTX_set_timeout(), then the session will eventually expire and end
> up triggering a rehandshake if application data was flowing in that
> session at expiration time. But I didnt see any such messages go out on
the wire.
This sets only timeout for session resumption.
This is done for performance reasons to not overload server with
time-consuming private key operation. For example browser connection to
WWW server over https with HTTP/1.0 can generate new session for any gif,
html and other. So if this connections are made within preconfigured time,
server may use already established encryption parameters (identified by
session_id in client_hello packet) to get abbreviated handshake.


______________________________________________________________________
OpenSSL Project                                 http://www.openssl.org
User Support Mailing List                    openssl-users@openssl.org
Automated List Manager                           [EMAIL PROTECTED]



********************************************************************************
This email message (including any attachments) is for the sole use of the 
intended recipient(s) 
and may contain confidential, proprietary and privileged information. Any 
unauthorized review, 
use, disclosure or distribution is prohibited. If you are not the intended 
recipient, 
please immediately notify the sender by reply email and destroy all copies of 
the original message. 
Thank you.
 
Intoto Inc. 

______________________________________________________________________
OpenSSL Project                                 http://www.openssl.org
User Support Mailing List                    openssl-users@openssl.org
Automated List Manager                           [EMAIL PROTECTED]

Reply via email to