> From: owner-openssl-us...@openssl.org On Behalf Of (me) > Sent: Wednesday, 31 October, 2012 18:22
> An "incoming" connection is usually, at least by connection, > an SSL server. > _by convention_ > In general: if an SSL connection/session uses an akRSA suite, > knowledge of the packets on the wire plus the server privatekey > is enough to decrypt (and/or verify) the data. If any DH or ECDH I meant to make that any _nonstatic_ [EC]DH (i.e. "ephemeral" with authentication, or "anonymous" without). OpenSSL doesn't implement static DH at all, and I've never seen anyone use static ECDH. > suite is used, server privatekey (and any client privatekey) is not > enough; per-session secret data from at least one endpoints one endpoint (no s). > is needed. > That is exactly the definition of "perfect forward secrecy". > Sorry. ______________________________________________________________________ OpenSSL Project http://www.openssl.org User Support Mailing List openssl-users@openssl.org Automated List Manager majord...@openssl.org