I am using openssl 1.0.1e-fips. When I ran the following against my server, I get a line in the output that begins with Server Temp Key
:
$ openssl s_client -cipher DHE-RSA-AES128-SHA -connect myserver.com:443 -state -tls1 -msg
...snipped...
Server Temp Key: DH, 2048 bits
...snipped...
$ openssl s_client -cipher ECDHE-RSA-AES128-SHA -connect myserver.com:443 -state -tls1 -msg
...snipped...
Server Temp Key: ECDH, prime256v1, 256 bits
...snipped...
Can I conclude that ECDHE-RSA-AES128-SHA
is "weaker" than DHE-RSA-AES128-SHA
given that its length is smaller than 2014 bits ? Is the Server TEMP key the negotiated protocol key i.e. the session key.