RE: Root Certificates dir

2007-03-23 Thread Marek Marcola
Hello, > 1) Can I able to do both EPHEMERAL RSA and DH EPHEMERAL same time ?? No, in this situation both algorithms are use for the same purpose (key exchange) so one may be used. > Will Openssl call either EPHEMERAL RSA or DH EPHEMERAL depend what > ciphers using ?? Depending on cipher suites.

RE: Root Certificates dir

2007-03-23 Thread Dinh, Thao V CIV NSWCDD, K72
From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On Behalf Of Marek Marcola Sent: Thursday, March 22, 2007 20:12 To: openssl-users@openssl.org Subject: RE: Root Certificates dir Hello, > I asked you last week: > > I have to interface with a client running > >TLS_RSA_WITH_3DES_EDE_

RE: Root Certificates dir

2007-03-22 Thread Marek Marcola
Hello, > I asked you last week: > > I have to interface with a client running > > TLS_RSA_WITH_3DES_EDE_CBC_SHA1. For me, it means: > >.. > > Please very my thought is correctly . DH is not involved at all ??? I > > always think that DH have to be involved when using symmetric key. > > Y

RE: Root Certificates dir

2007-03-22 Thread Dinh, Thao V CIV NSWCDD, K72
Subject: Re: Root Certificates dir On Thu, Mar 22, 2007, Dinh, Thao V CIV NSWCDD, K72 wrote: > > I can not use temporary RSA keys because of: > > >Temporary RSA keys are only used in some export ciphersuites which > >are > now obsolete. The use of ephemeral > >

Re: Root Certificates dir

2007-03-22 Thread Dr. Stephen Henson
On Thu, Mar 22, 2007, Dinh, Thao V CIV NSWCDD, K72 wrote: > > I can not use temporary RSA keys because of: > > >Temporary RSA keys are only used in some export ciphersuites which are > now obsolete. The use of ephemeral > > RSA keys actually violates the standards in that particular > ciphersui

RE: Root Certificates dir

2007-03-22 Thread Dinh, Thao V CIV NSWCDD, K72
can I do to implement Ephemeral keying ??? Please help. I have limited knowledge in this openssl. Thank You TD -Original Message- From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On Behalf Of Marek Marcola Sent: Thursday, March 15, 2007 14:03 To: openssl-users@openssl.org Subject: RE: Root

RE: Root Certificates dir

2007-03-16 Thread Marek Marcola
Hello, > Last year, you wrote that > If you add to server initialization routine something like: > > RSA *rsa; > > rsa=RSA_generate_key(512,RSA_F4,NULL,NULL); > > if (!SSL_CTX_set_tmp_rsa(SSL_context,rsa)){ > > ExitPostmaster(1); > > } > > RSA_free(rsa);

RE: Root Certificates dir

2007-03-16 Thread Dinh, Thao V CIV NSWCDD, K72
14:03 To: openssl-users@openssl.org Subject: RE: Root Certificates dir Hello, > I have to interface with a client running > TLS_RSA_WITH_3DES_EDE_CBC_SHA1. For me, it means: > > 1) Authentification with RSA > 2) Key exchange RSA > 3) Encrytion 3DES_EDE_CBC > 4) Digest SHA1 I a

RE: Root Certificates dir

2007-03-15 Thread Marek Marcola
Hello, > I have to interface with a client running > TLS_RSA_WITH_3DES_EDE_CBC_SHA1. For me, it means: > > 1) Authentification with RSA > 2) Key exchange RSA > 3) Encrytion 3DES_EDE_CBC > 4) Digest SHA1 I agree. > My question is how do they get Key exchange if they not using DH ?? > Another thou

RE: Root Certificates dir

2007-03-15 Thread Dinh, Thao V CIV NSWCDD, K72
that DH have to be involved when using symmetric key. Thank You TD -Original Message- From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On Behalf Of Marek Marcola Sent: Monday, March 12, 2007 14:24 To: openssl-users@openssl.org Subject: RE: Root Certificates dir Hello, > I have basic

RE: Root Certificates dir

2007-03-12 Thread Marek Marcola
Hello, > I have basic question for Client-Sever using SSL. Both Client/Server > have to use SL_CTX_load_verify_locations to load "Trust Root". Yes. > But Client will load its own private/public key, does not need to load > "server" cert at all . Yes, client loads its private key (which has publi

RE: Root Certificates dir

2007-03-12 Thread Dinh, Thao V CIV NSWCDD, K72
07 13:30 To: openssl-users@openssl.org Subject: Re: Root Certificates dir Hello, > I am working on Client-Server applications using SSL. My Server has 3 > or 4 "Trust Root ' certs I use SSL_CTX_load_verify_locations pointing > to a directory which stores all "Trust Root

RE: Root Certificates dir

2007-03-12 Thread Dinh, Thao V CIV NSWCDD, K72
rg Subject: Re: Root Certificates dir Hello, > I am working on Client-Server applications using SSL. My Server has 3 > or 4 "Trust Root ' certs I use SSL_CTX_load_verify_locations pointing > to a directory which stores all "Trust Root ' certs . > I created a

Re: Root Certificates dir

2007-03-12 Thread Victor Duchovni
On Mon, Mar 12, 2007 at 06:29:36PM +0100, Marek Marcola wrote: > > 1) Do I have concatenant all "Trusted Root" in to one cert ?? ( cat > > root1 root2 root3 > root) ? > > No, but you should execute c_rehash in that directory. Speaking of "c_rehash" has anyone looked into fixing the script so tha

Re: Root Certificates dir

2007-03-12 Thread Marek Marcola
Hello, > I am working on Client-Server applications using SSL. My Server has 3 > or 4 "Trust Root ' certs > I use SSL_CTX_load_verify_locations pointing to a directory which > stores all "Trust Root ' certs . > I created a directory ( T1) and load all "Trust Root" certs into > this T1 dir