On Thu, Dec 14, 2006 at 01:27:10PM +0100, Marek Marcola wrote:
> > This is done by simply appending the key to the digest input.
> I can not agree. In HMAC you use some message digest algorithm
> (MD5/SHA1/...) with HMAC algorithm.
> Let MD() will be some message digest algorithm, M - message t
Hello,
> H = HMAC(packet_sequence+packet_proto+ssl_version
> +data_len,server_write_mac)
Should be:
H = HMAC(packet_sequence+packet_proto+ssl_version+data_len
+M,server_write_mac)
Best regards,
--
Marek Marcola <[EMAIL PROTECTED]>
Hello,
> 1. In apache server, Where i specify which message digest algorithm is used
> (MD5/SHA)
In Apache this is specified in SSLCipherSuite directive.
> 2. Is Message digest process to be done after encryption() ? if no, which
> step the message digest process to be process ?
HMAC is calculat
Hello,
> > Hello,
> > > H = HMAC(packet_proto+ssl_version+data_len+M, server_write_mac)
> > Should be:
> > H = HMAC(packet_sequence+packet_proto+ssl_version+data_len+M,
> > server_write_mac)
> >
>
> Marek,
>
> You forgot to mention that HMAC has a secret key associated with it so
> th
Hi,
Thanks for your explanation
1. In apache server, Where i specify which message digest algorithm is used
(MD5/SHA)
H = HMAC(packet_proto+ssl_version+data_len+M, server_write_mac)
W = ENCRYPT(M+H+pad, server_write_key)
2. Is Message digest process to be done after encryption() ? if no, whic
On Wed, Dec 13, 2006 at 08:45:50PM +0100, Marek Marcola wrote:
> Hello,
> > H = HMAC(packet_proto+ssl_version+data_len+M, server_write_mac)
> Should be:
> H = HMAC(packet_sequence+packet_proto+ssl_version+data_len+M,
> server_write_mac)
>
Marek,
You forgot to mention that HMAC has a
Hello,
> H = HMAC(packet_proto+ssl_version+data_len+M, server_write_mac)
Should be:
H = HMAC(packet_sequence+packet_proto+ssl_version+data_len+M,
server_write_mac)
Best regards,
--
Marek Marcola <[EMAIL PROTECTED]>
__
OpenSS
Hello,
> 1. In symmetric cryptography process, server and browser both are
> negotiate to chooses cipher algorithms for encrypt/decrypt data right ?
Yes, but precisely speaking there are negotiated two algorithms
one for encrypt/decrypt SSL packets (DES/AES/...) and one for
ensuring SSL packet int
Hi,
Sorry for asking so many basic question.. I am reading reading lot of
document... but i want to confirm from expects.
1. In symmetric cryptography process, server and browser both are
negotiate to chooses cipher algorithms for encrypt/decrypt data right ?
2. Cipher algorithms is not used
On Wed, Dec 13, 2006, bsenthil wrote:
> Hi,
>
> I am using only server certificate file and not using client
> authentication. In that case how it works ?
> (public/private key pair is generated only for server end)
>
> 1. User connect to the server https://server
>
> 2. server will send its c
Hi Patrick Patterson,
First i thank you for your response
/When the session is established, the client generates a key-pair and
self-signed certificate... this is why the mode that you are describing is
called "anonymous". So, after the SSL Session is negotiated, the server will
use the brow
Hello,
> I am using only server certificate file and not using client
> authentication. In that case how it works ?
> (public/private key pair is generated only for server end)
>
> 1. User connect to the server https://server
>
> 2. server will send its certificate to browser for examines its
>
Hi Senthilkumar,
responses inline...
On Wednesday 13 December 2006 07:44, bsenthil wrote:
> Hi,
>
> I am using only server certificate file and not using client
> authentication. In that case how it works ?
> (public/private key pair is generated only for server end)
>
> 1. User connect to the se
Hi,
I am using only server certificate file and not using client
authentication. In that case how it works ?
(public/private key pair is generated only for server end)
1. User connect to the server https://server
2. server will send its certificate to browser for examines its
certificate cre
14 matches
Mail list logo