On Thu, Jan 10, 2008 at 11:54:44PM -0500, Victor Duchovni wrote: > On Thu, Jan 10, 2008 at 10:25:00PM -0500, Victor Duchovni wrote: > > > > Does 'openssl s_server' support this? Are there public ECC TLS > > > implementations this is known to interoperate with? > > > > OpenSSL s_server is a test tool, not an application. In 0.9.9 snapshot > > builds, s_server support ECDSA, just point your cert and key files > > at an ECDSA cert and private key. I have not checked whether it has a > > command-line option to select an EECDH curve, but this is not important. > > The command-line option is "-named_curve", and if no curve is specified > "prime256v1" is used by default unless the "-no_ecdhe" option is supplied > (in which case any name curve is also ignored). > > So, for what its worth, s_server and s_client fully support EECDH > and ECDSA.
And as mentioned, using openssl-SNAP-20080110.tar.gz and as yet unreleased, Postfix 2.6 code: Jan 11 00:25:51 amnesiac postfix/smtpd[11499]: Trusted TLS connection established from localhost[127.0.0.1]: TLSv1 with cipher ECDHE-ECDSA-AES256-SHA (256/256 bits) Jan 11 00:25:51 amnesiac postfix/smtp[11497]: Verified TLS connection established to 127.0.0.1[127.0.0.1]:26: TLSv1 with cipher ECDHE-ECDSA-AES256-SHA (256/256 bits) Similar results with s_client and s_server: New, TLSv1/SSLv3, Cipher is ECDHE-ECDSA-AES256-SHA Server public key is 256 bit Compression: NONE Expansion: NONE SSL-Session: Protocol : TLSv1 Cipher : ECDHE-ECDSA-AES256-SHA Session-ID: ... Session-ID-ctx: Master-Key: ... Key-Arg : None PSK identity: None PSK identity hint: None Start Time: 1200030218 Timeout : 300 (sec) Verify return code: 0 (ok) What's missing: - A stable (not dev snapshot) OpenSSL 0.9.9 release - Officially released EC supporting applications (Apache, Firefox, Postfix, ...) - Public CAs signing ECDSA certificates, ideally via ECDSA roots! The last may take some time, the market pressure for broad EC deployment is not really there yet. Give it a few years... Below, if you are curious, are the ECDSA CA and server certs (prime256v1): -rw-r--r-- 1 luser grp 1086 Jan 11 00:32 eccacert.pem -rw-r--r-- 1 luser grp 1188 Jan 11 00:32 ecdsacert.pem RSA 2048 bit certs with otherwise identical features come to: -rw-r--r-- 1 luser grp 4930 Jan 11 00:33 cacert.pem -rw-r--r-- 1 luser grp 5252 Jan 11 00:33 rsacert.pem Certificate: Data: Version: 3 (0x2) Serial Number: e7:ed:11:3a:5f:51:0d:4d Signature Algorithm: ecdsa-with-SHA1 Issuer: C=US, ST=New York, L=New York, O=Example Corp, CN=Insecure CA/[EMAIL PROTECTED] Validity Not Before: Jan 11 05:17:59 2008 GMT Not After : Jan 11 05:17:59 2018 GMT Subject: C=US, ST=New York, L=New York, O=Example Corp, CN=Insecure CA/[EMAIL PROTECTED] Subject Public Key Info: Public Key Algorithm: id-ecPublicKey Public-Key: (256 bit) pub: 04:e6:0e:ec:fe:04:df:13:5d:78:f7:c4:52:a1:94: ee:19:09:13:b4:59:7d:d0:a2:73:38:ef:42:b8:40: a1:d5:03:5b:18:e2:2b:6c:05:87:22:bb:5a:af:6a: 82:b5:d5:03:0e:07:8c:40:cc:43:b8:1c:2d:09:cc: 97:a0:eb:e5:06 ASN1 OID: prime256v1 X509v3 extensions: X509v3 Basic Constraints: critical CA:TRUE X509v3 Subject Key Identifier: 0E:D4:AA:B1:09:91:7C:36:60:EA:56:4E:9C:57:00:AF:9C:4D:02:00 X509v3 Authority Key Identifier: keyid:0E:D4:AA:B1:09:91:7C:36:60:EA:56:4E:9C:57:00:AF:9C:4D:02:00 DirName:/C=US/ST=New York/L=New York/O=Example Corp/CN=Insecure CA/[EMAIL PROTECTED] serial:E7:ED:11:3A:5F:51:0D:4D Signature Algorithm: ecdsa-with-SHA1 30:43:02:1f:7e:e3:7c:d8:de:56:fb:f1:dd:e2:1a:5a:fb:45: 24:f4:18:24:8a:a0:fa:fc:f5:6e:88:ce:25:20:89:4d:9d:02: 20:71:86:6c:eb:a7:58:00:b1:b7:d4:e6:0c:03:d2:27:73:cd: e9:30:91:f7:7a:dc:9d:fd:a4:91:0c:91:05:a8:27 -----BEGIN CERTIFICATE----- MIIC9jCCAp+gAwIBAgIJAOftETpfUQ1NMAkGByqGSM49BAEwgYcxCzAJBgNVBAYT AlVTMREwDwYDVQQIEwhOZXcgWW9yazERMA8GA1UEBxMITmV3IFlvcmsxFTATBgNV BAoTDEV4YW1wbGUgQ29ycDEUMBIGA1UEAxMLSW5zZWN1cmUgQ0ExJTAjBgkqhkiG 9w0BCQEWFnBvc3RtYXN0ZXJAZXhhbXBsZS5jb20wHhcNMDgwMTExMDUxNzU5WhcN MTgwMTExMDUxNzU5WjCBhzELMAkGA1UEBhMCVVMxETAPBgNVBAgTCE5ldyBZb3Jr MREwDwYDVQQHEwhOZXcgWW9yazEVMBMGA1UEChMMRXhhbXBsZSBDb3JwMRQwEgYD VQQDEwtJbnNlY3VyZSBDQTElMCMGCSqGSIb3DQEJARYWcG9zdG1hc3RlckBleGFt cGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABOYO7P4E3xNdePfEUqGU 7hkJE7RZfdCiczjvQrhAodUDWxjiK2wFhyK7Wq9qgrXVAw4HjEDMQ7gcLQnMl6Dr 5QajgfIwge8wDwYDVR0TAQH/BAUwAwEB/zAdBgNVHQ4EFgQUDtSqsQmRfDZg6lZO nFcAr5xNAgAwgbwGA1UdIwSBtDCBsYAUDtSqsQmRfDZg6lZOnFcAr5xNAgChgY2k gYowgYcxCzAJBgNVBAYTAlVTMREwDwYDVQQIEwhOZXcgWW9yazERMA8GA1UEBxMI TmV3IFlvcmsxFTATBgNVBAoTDEV4YW1wbGUgQ29ycDEUMBIGA1UEAxMLSW5zZWN1 cmUgQ0ExJTAjBgkqhkiG9w0BCQEWFnBvc3RtYXN0ZXJAZXhhbXBsZS5jb22CCQDn 7RE6X1ENTTAJBgcqhkjOPQQBA0YAMEMCH37jfNjeVvvx3eIaWvtFJPQYJIqg+vz1 bojOJSCJTZ0CIHGGbOunWACxt9TmDAPSJ3PN6TCR93rcnf2kkQyRBagn -----END CERTIFICATE----- Certificate: Data: Version: 3 (0x2) Serial Number: e7:ed:11:3a:5f:51:0d:4e Signature Algorithm: ecdsa-with-SHA1 Issuer: C=US, ST=New York, L=New York, O=Example Corp, CN=Insecure CA/[EMAIL PROTECTED] Validity Not Before: Jan 11 05:18:20 2008 GMT Not After : Jan 10 05:18:20 2009 GMT Subject: C=US, ST=New York, L=New York, O=Example Corp, OU=Marketing Department, CN=mktg.example.com/[EMAIL PROTECTED] Subject Public Key Info: Public Key Algorithm: id-ecPublicKey Public-Key: (256 bit) pub: 04:40:c7:8a:54:c1:24:82:59:dc:17:32:59:36:d6: a3:69:95:39:83:17:11:55:c8:45:6c:24:52:a6:3f: e6:11:6f:1d:5c:19:31:b4:23:16:62:31:fd:1c:68: 4f:b6:b7:13:85:c4:53:aa:60:be:92:38:93:7a:4d: 31:be:ff:50:58 ASN1 OID: prime256v1 X509v3 extensions: X509v3 Basic Constraints: critical CA:FALSE X509v3 Key Usage: Digital Signature, Key Encipherment X509v3 Extended Key Usage: TLS Web Server Authentication, TLS Web Client Authentication X509v3 Subject Key Identifier: BC:44:11:0B:15:40:E2:15:6F:EA:F4:55:B9:1A:87:EA:55:B6:B9:98 X509v3 Authority Key Identifier: keyid:0E:D4:AA:B1:09:91:7C:36:60:EA:56:4E:9C:57:00:AF:9C:4D:02:00 DirName:/C=US/ST=New York/L=New York/O=Example Corp/CN=Insecure CA/[EMAIL PROTECTED] serial:E7:ED:11:3A:5F:51:0D:4D Signature Algorithm: ecdsa-with-SHA1 30:45:02:20:67:ea:d0:80:8c:d3:bd:ee:db:bf:9b:db:c8:a9: f0:6b:b2:b5:ff:7e:93:20:8b:64:7c:1b:bb:26:25:1f:39:6b: 02:21:00:db:18:00:03:ee:b0:8d:a3:42:35:db:83:26:0b:95: 6d:c8:b2:9f:48:7d:1c:55:c3:6b:3b:18:09:8c:49:d2:a5 -----BEGIN CERTIFICATE----- MIIDQTCCAuigAwIBAgIJAOftETpfUQ1OMAkGByqGSM49BAEwgYcxCzAJBgNVBAYT AlVTMREwDwYDVQQIEwhOZXcgWW9yazERMA8GA1UEBxMITmV3IFlvcmsxFTATBgNV BAoTDEV4YW1wbGUgQ29ycDEUMBIGA1UEAxMLSW5zZWN1cmUgQ0ExJTAjBgkqhkiG 9w0BCQEWFnBvc3RtYXN0ZXJAZXhhbXBsZS5jb20wHhcNMDgwMTExMDUxODIwWhcN MDkwMTEwMDUxODIwWjCBpTELMAkGA1UEBhMCVVMxETAPBgNVBAgTCE5ldyBZb3Jr MREwDwYDVQQHEwhOZXcgWW9yazEVMBMGA1UEChMMRXhhbXBsZSBDb3JwMR0wGwYD VQQLExRNYXJrZXRpbmcgRGVwYXJ0bWVudDEZMBcGA1UEAxMQbWt0Zy5leGFtcGxl LmNvbTEfMB0GCSqGSIb3DQEJARYQbWt0Z0BleGFtcGxlLmNvbTBZMBMGByqGSM49 AgEGCCqGSM49AwEHA0IABEDHilTBJIJZ3BcyWTbWo2mVOYMXEVXIRWwkUqY/5hFv HVwZMbQjFmIx/RxoT7a3E4XEU6pgvpI4k3pNMb7/UFijggEcMIIBGDAMBgNVHRMB Af8EAjAAMAsGA1UdDwQEAwIFoDAdBgNVHSUEFjAUBggrBgEFBQcDAQYIKwYBBQUH AwIwHQYDVR0OBBYEFLxEEQsVQOIVb+r0Vbkah+pVtrmYMIG8BgNVHSMEgbQwgbGA FA7UqrEJkXw2YOpWTpxXAK+cTQIAoYGNpIGKMIGHMQswCQYDVQQGEwJVUzERMA8G A1UECBMITmV3IFlvcmsxETAPBgNVBAcTCE5ldyBZb3JrMRUwEwYDVQQKEwxFeGFt cGxlIENvcnAxFDASBgNVBAMTC0luc2VjdXJlIENBMSUwIwYJKoZIhvcNAQkBFhZw b3N0bWFzdGVyQGV4YW1wbGUuY29tggkA5+0ROl9RDU0wCQYHKoZIzj0EAQNIADBF AiBn6tCAjNO97tu/m9vIqfBrsrX/fpMgi2R8G7smJR85awIhANsYAAPusI2jQjXb gyYLlW3Isp9IfRxVw2s7GAmMSdKl -----END CERTIFICATE----- -- Viktor. ______________________________________________________________________ OpenSSL Project http://www.openssl.org User Support Mailing List openssl-users@openssl.org Automated List Manager [EMAIL PROTECTED]