Ah, yes. Thanks for the correction.

Something I read previously made me think some of the ciphersuites (perhaps
the DH suites? - this is also where I was thinking client auth for some
reason) required the server to send part of the keying material to the
client (via the client's pub key), which would require the private key of
the client to decode. I've never run into client auth or DH suites so
they're a bit fuzzy to me; guess I'm making up things to fill in the blanks.
:-)

Regards
Mark

On 4/9/07, Sake Blok <[EMAIL PROTECTED]> wrote:

On Mon, Apr 09, 2007 at 01:00:32PM -0400, Mark Roggenkamp wrote:
> Also, if the https session isn't using client auth then you probably
only
> need the private key of the WebSeal host.

Even if the https-connection IS using a client-certificate, the private
key of the client-certificate is only used for authentication and is not
taking part in the encryption of the session. Only the private key of
the server-certificate is used to generate the session-keys :)

Cheers,


Sake
_______________________________________________
Wireshark-users mailing list
Wireshark-users@wireshark.org
http://www.wireshark.org/mailman/listinfo/wireshark-users

_______________________________________________
Wireshark-users mailing list
Wireshark-users@wireshark.org
http://www.wireshark.org/mailman/listinfo/wireshark-users

Reply via email to