LinuxQuestions.org
Welcome to the most active Linux Forum on the web.
Home Forums Tutorials Articles Register
Go Back   LinuxQuestions.org > Forums > Linux Forums > Linux - Security
User Name
Password
Linux - Security This forum is for all security related questions.
Questions, tips, system compromises, firewalls, etc. are all included here.

Notices


Reply
  Search this Thread
Old 07-29-2014, 12:16 AM   #1
SarahGurung
Member
 
Registered: Jul 2011
Posts: 322

Rep: Reputation: Disabled
128 bits key generated when 1024 was generated(centos 6.5)using openssl


Hello,
i recently created ssl certificated to implement tls in one of our smtp servers since saslauth was implemented. The first command that i used was:
Code:
openssl genrsa -des3 -rand /etc/hosts -out smtpd.key 1024
this clearly shows that the it's 1024 bit key. But when i sent a test mail through an email client i was it as 128 bit key i the header and showed the same in the log too
Code:
TLSv1 with cipher xxxxxxxxxx (128/128 bits)
Why is it so and if 128 bit has been created how do i make it at least 512 or greater bits key?
 
Old 07-29-2014, 03:25 AM   #2
Ser Olmy
Senior Member
 
Registered: Jan 2012
Distribution: Slackware
Posts: 3,344

Rep: Reputation: Disabled
This is perfectly normal. There are two keys involved here: a 1024 bit asymmetric RSA key (for authentication purposes) and a 128 bit (or longer) symmetric session key (to do the actual encryption).

(1024 bit is a bit on the short side for an RSA key, actually. Most CAs will reject Certificate Signing Requests if the RSA key is not at least 2048 bit.)
 
Old 07-29-2014, 03:33 AM   #3
SarahGurung
Member
 
Registered: Jul 2011
Posts: 322

Original Poster
Rep: Reputation: Disabled
thank u for the reply.

Oh then how can i make the symmetric key longer now,i mean more than 128 bits since u said that's the one which does the encryption? Or is the symmetric key always 128 bit only?
 
Old 07-29-2014, 07:03 AM   #4
Ser Olmy
Senior Member
 
Registered: Jan 2012
Distribution: Slackware
Posts: 3,344

Rep: Reputation: Disabled
No, the symmetric SSL key can be anything from 56-bit DES to 256-bit AES. It's up to the server/application doing the SSL/TLS handshake to decide which algorithms to accept and what the minimum keylength should be.

A 128-bit symmetric key should provide more than adequate security, assuming the algorithm itself and the key exchange process isn't flawed. For instance, 128-bit AES is fine, while 128-bit RC4 should be avoided. 168-bit 3DES ("keying option 3") is so-so; it has no obvious flaws, but requires considerably more processing power than AES. 3DES was only created as a stop-gap measure in 1998, meant to temporarily replace the by then hopelessly outdated DES algorithm while the AES standard was being finalized.
 
  


Reply



Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

BB code is On
Smilies are On
[IMG] code is Off
HTML code is Off



Similar Threads
Thread Thread Starter Forum Replies Last Post
Rsyslog + Openssl generated certificates Mirage42 Linux - Software 0 12-31-2010 03:11 AM
ssl certificate generated from openssl into tomcat bradvan Linux - Security 2 07-17-2009 07:57 AM
How to add a putty generated .ppk key ZAMO Linux - General 2 07-10-2008 07:49 PM
ssh randomly generated key Operations Linux - Security 1 06-10-2002 10:49 PM
ssh randomly generated key Operations *BSD 1 06-10-2002 10:25 AM

LinuxQuestions.org > Forums > Linux Forums > Linux - Security

All times are GMT -5. The time now is 12:58 AM.

Main Menu
Advertisement
My LQ
Write for LQ
LinuxQuestions.org is looking for people interested in writing Editorials, Articles, Reviews, and more. If you'd like to contribute content, let us know.
Main Menu
Syndicate
RSS1  Latest Threads
RSS1  LQ News
Twitter: @linuxquestions
Open Source Consulting | Domain Registration