Thanks a ton Sander.

So on session setup-phase, the server sends the public-key to the client
(which would hardly be a bother, even if it is intercepted by a
eavesdropper). This public key is then used to encrypt the data on the
client, send over the wire, and decrypted by the server's private key.

That explains the client-to-server-transfer.

However, just one last confirmation regarding the
server-to-client-transfer. Is another set of public-private (session) keys
pair created? (This would then explain the server-to-client transfer
seamlessly, wherein the client would send the (session) public key to the
server; server would encrypt data using this (session) public key; send the
data over the wire; and the client would then decrypt data using the
(session) private key).

Thanks Sander. You have really been a darling in all the help ;-)

Thanks and Regards,
Ajay



On Mon, Mar 26, 2012 at 11:03 AM, Sander Temme <scte...@apache.org> wrote:

> Ajay,
> On Mar 25, 2012, at 9:54 PM, Ajay Garg wrote:
>
> > Thanks Eric for the reply.
> >
> > Eric, but how is the shared secret comfigured?
> > I do not remember configuring anything like this for the HTTPS-based
> WebDAV server.
>
> As your DAV client and the server set up their SSL connection, they
> exchange information that is used by either side to derive a set of session
> encryption keys.  This starts with a piece of random data generated by the
> client, wrapped in the public key from the server's certificate, and sent
> to the server.  Since only the server has the corresponding private key, no
> eavesdropper can intercept this piece of data, and no one but the server
> and client have the proper input material to derive those session keys.
>
> Once the session keys are created, they are used by either side to sign,
> encrypt, decrypt and verify the SSL records sent across the connection.
>
> So the only thing that is pre-arranged is the key/certificate on the
> server, and the fact that the client trusts the server certificate (through
> the CA certificate in the client's key store or CA bundle).
>
> Hope this helps,
>
> S.
>
> > Thanks and Regards,
> > Ajay
> >
> > On Sun, Mar 25, 2012 at 11:39 PM, Eric Covener <cove...@gmail.com>
> wrote:
> > > BUT, HOW IS THE CLIENT ABLE TO DECRYPT THE DATA? (I have been running
> both
> > > webdav server and client on the same machine; so it might very well
> > > be the case that some info from "ssl.conf" and/or "httpd.conf" is
> being used
> > > at the client side. However, I am just guessing ...
> >
> > Under SSL, the client and server negotiate a shared secret used to
> > encrypt/decrypt the data.
> >
> > They can set this up securely because the client starts this process
> > with info encrypted with the servers public key.
> >
> > ---------------------------------------------------------------------
> > To unsubscribe, e-mail: users-unsubscr...@httpd.apache.org
> > For additional commands, e-mail: users-h...@httpd.apache.org
> >
> >
>
>
> --
> scte...@apache.org            http://www.temme.net/sander/
> PGP FP: FC5A 6FC6 2E25 2DFD 8007  EE23 9BB8 63B0 F51B B88A
>
> View my availability: http://tungle.me/sctemme
>
>
>
> ---------------------------------------------------------------------
> To unsubscribe, e-mail: users-unsubscr...@httpd.apache.org
> For additional commands, e-mail: users-h...@httpd.apache.org
>
>

Reply via email to