> From: owner-openssl-us...@openssl.org On Behalf Of (me)
> Sent: Wednesday, 31 October, 2012 18:22

> An "incoming" connection is usually, at least by connection, 
> an SSL server.
> 
_by convention_

> In general: if an SSL connection/session uses an akRSA suite, 
> knowledge of the packets on the wire plus the server privatekey 
> is enough to decrypt (and/or verify) the data. If any DH or ECDH 

I meant to make that any _nonstatic_ [EC]DH (i.e. "ephemeral" with 
authentication, or "anonymous" without). OpenSSL doesn't implement 
static DH at all, and I've never seen anyone use static ECDH.

> suite is used, server privatekey (and any client privatekey) is not 
> enough; per-session secret data from at least one endpoints 

one endpoint (no s).

> is needed. 
> That is exactly the definition of "perfect forward secrecy".
> 
Sorry.

______________________________________________________________________
OpenSSL Project                                 http://www.openssl.org
User Support Mailing List                    openssl-users@openssl.org
Automated List Manager                           majord...@openssl.org

Reply via email to