Cipher Negotiation

2006-06-29 Thread Chris Clark
I have written a client program in which I allow the user to configure which cipher groups they want to allow as well as a cipher strength of low, medium, or high. The problem is I can't find a way of selecting the order in which I want the cipher negotiated. For example if all ciphers are enable

Re: Cipher Negotiation

2006-06-30 Thread Victor Duchovni
On Thu, Jun 29, 2006 at 12:28:44PM -0700, Chris Clark wrote: > I have written a client program in which I allow the user to configure > which cipher groups they want to allow as well as a cipher strength of > low, medium, or high. > > The problem is I can't find a way of selecting the order in wh

Re: Cipher Negotiation

2006-06-30 Thread Victor Duchovni
On Fri, Jun 30, 2006 at 07:19:39AM -0400, Victor Duchovni wrote: > On Thu, Jun 29, 2006 at 12:28:44PM -0700, Chris Clark wrote: > > > I have written a client program in which I allow the user to configure > > which cipher groups they want to allow as well as a cipher strength of > > low, medium,

Re: Cipher Negotiation

2006-06-30 Thread Bodo Moeller
On Fri, Jun 30, 2006 at 07:29:04AM -0400, Victor Duchovni wrote: >>> Currently I specify the group (HIGH/MEDIUM/LOW) and remove some ciphers >>> from a group (IDEA and ADH). I also remove AES at the beginning (Shif >>> +="-AES:") and add it later because if I don't remove AES there is no >>> way t

Re: Cipher Negotiation

2006-06-30 Thread Chris Clark
> The problem is I can't find a way of selecting the order in which I > want the cipher negotiated. For example if all ciphers are enabled in > the configuration, I would perfer if AES is selected during > negoitation. What real problem is this intended to solve? Because AES is faster then othe

Re: Cipher Negotiation

2006-06-30 Thread Chris Clark
It's not a bug that AES182 is classified as "HIGH", although it is a missing feature that there is no class that encompasses only the 256-bit ciphers. That's why there now is "@STRENGTH", which does not add any ciphers and just sorts the one enabled so far. I assume "AES182" is a typo for AES12

Re: Cipher Negotiation

2006-06-30 Thread Bodo Moeller
On Fri, Jun 30, 2006 at 09:41:08AM -0700, Chris Clark wrote: >> It's not a bug that AES182 is classified as "HIGH", although it is a >> missing feature that there is no class that encompasses only the >> 256-bit ciphers. That's why there now is "@STRENGTH", which does >> not add any ciphers and j

Re: Cipher negotiation failure

2000-08-30 Thread Lutz Jaenicke
[moved to openssl-users] On Wed, Aug 30, 2000 at 01:07:45PM -0500, mandyam wrote: > I have a simple client-server app. performing both client and server > authentication using the 9.5a toolkit. I am forcing the server to use > DES-CBC3-SHA by calling >SSL_set_cipher_li

RE: Cipher negotiation failure

2000-08-30 Thread mandyam
ther than -1? I also noticed that after cipher=NONE, the SSL_read() call hangs in the server. -Original Message- From: Lutz Jaenicke [mailto:[EMAIL PROTECTED]] Sent: Wednesday, August 30, 2000 2:20 PM To: [EMAIL PROTECTED] Cc: mandyam Subject: Re: Cipher negotiation failure [moved to opens

Re: Cipher negotiation failure

2000-08-30 Thread Lutz Jaenicke
On Wed, Aug 30, 2000 at 03:25:48PM -0500, mandyam wrote: > Thanks. I noticed that I do have the following code in my server app. > - > err = SSL accept(ssl); > if (err==-1) { >ERR_print_errors_fp(stderr); >return err; > } > SSL_g

SSL3 session cipher negotiation failure

1999-06-16 Thread Anonymous
Hi. I am fairly new to OpenSSL programming, so let me describe my problem in detail first. I have a program which uses OpenSSL 0.9.3a to connect to a HTTPS server. It uses the following logic: init SSL libraries select SSL method (SSLv23_client_method) create SSL context (SSL_CTX_new)

How to change cipher negotiation sequence?

2004-06-25 Thread Olkovikas, James
Hello all, Netscape browsers fail on our site if the DHE-RSA-AES128-SHA cipher is enabled on the browser. I have tried for many hours to use the "openssl ciphers" command on the web server to push this cipher to the end of the list, without any luck. What really confuses me is our test server has

How to change cipher negotiation sequence?

2004-06-29 Thread Olkovikas, James
Hello all, Netscape browsers fail on our site if the DHE-RSA-AES128-SHA cipher is enabled on the browser. I have tried for many hours to use the "openssl ciphers" command on the web server to push this cipher to the end of the list, without any luck. Am I attacking the problem correctly, or am I

Re: SSL3 session cipher negotiation failure

1999-06-16 Thread Anonymous
James K Hendrix <[EMAIL PROTECTED]>: > I am fairly new to OpenSSL programming, so let me describe my problem > in detail first. I have a program which uses OpenSSL 0.9.3a to > connect to a HTTPS server. Let me guess, a Netscape server? [...] > create SSL session (SSL_new) > while (not done

Re: How to change cipher negotiation sequence?

2004-06-26 Thread Dr. Stephen Henson
On Fri, Jun 25, 2004, Olkovikas, James wrote: > > Hello all, > > Netscape browsers fail on our site if the DHE-RSA-AES128-SHA cipher is > enabled on the browser. I have tried for many hours to use the "openssl > ciphers" command on the web server to push this cipher to the end of the > list, wit