Re: Determining algorithm strength of current SSL cipher

2006-02-08 Thread Victor Duchovni
On Wed, Feb 08, 2006 at 12:53:26PM -0700, Kyle Hamilton wrote: > Check the documentation for the various levels to see what each cipher > falls into. Specifically, "LOW" is any 40 or 56-bit cipher, and 768 > bytes or below RSA key. MEDIUM is any 128 bit cipher (except AES) and > 1024 bits or mor

Re: Determining algorithm strength of current SSL cipher

2006-02-08 Thread Kyle Hamilton
Check the documentation for the various levels to see what each cipher falls into. Specifically, "LOW" is any 40 or 56-bit cipher, and 768 bytes or below RSA key. MEDIUM is any 128 bit cipher (except AES) and 1024 bits or more of RSA key. HIGH is any 256-bit cipher, any AES cipher, and 2048+ bit

Re: Determining algorithm strength of current SSL cipher

2006-02-08 Thread Victor Duchovni
On Tue, Feb 07, 2006 at 11:32:43PM -0700, Kyle Hamilton wrote: > On 2/7/06, Victor Duchovni <[EMAIL PROTECTED]> wrote: > > > > For Postfix 2.3 I would like to be able to determine whether the actual > > cipher negotiated for a session initialized with a lenient allowed cipher > > list, is actually

Re: Determining algorithm strength of current SSL cipher

2006-02-07 Thread Kyle Hamilton
The cipher negotiated is a property of the SSL connection itself. SSL_get_current_cipher() is probably what you're looking for: http://www.openssl.org/docs/ssl/SSL_get_current_cipher.html for documentation. -Kyle H On 2/7/06, Victor Duchovni <[EMAIL PROTECTED]> wrote: > > For Postfix 2.3 I would