So according to you, knowing just the secret key of the server wouldn't be
sufficient to decrypt the data without using brute force?

> -----Original Message-----
> From: Bodo Moeller [SMTP:[EMAIL PROTECTED]]
> Sent: Tuesday, June 15, 1999 5:46 PM
> To:   [EMAIL PROTECTED]
> Subject:      Re: advice needed
> 
> On Tue, Jun 15, 1999 at 04:54:40PM +0200, Pierre De Boeck wrote:
> 
> > I think your concept of SSL/TLS sniffer is not realistic
> > in a general way, for the following reasons:
> > 
> >     - the packets transmitted between a client and a server have
> submitted
> >       a set of "transformations" (fragmentation, compression(optional)+
> >       encryption(optional)+"MACed")
> >     - to recover the original payload, you must, among other things,
> know
> >             - the compression alg/param used if any
> >             - the cipher alg.param used (e.g. RC2-CBC-40 with a specific
> IV)+
> >               the secret key
> > 
> > That information is shared by the two parties but obviously not
> transported
> > in the packets.
> 
> Of course it's not trivial to read the encrypted payload data, but the
> algorithm identifiers are transmitted in clear; so the attacker can
> tell which connections use only 40-bit encryption keys, and -- if
> enough computing power can be put into this -- can do key-searches for
> those and then decrypt them.
> ______________________________________________________________________
> OpenSSL Project                                 http://www.openssl.org
> Development Mailing List                       [EMAIL PROTECTED]
> Automated List Manager                           [EMAIL PROTECTED]
______________________________________________________________________
OpenSSL Project                                 http://www.openssl.org
Development Mailing List                       [EMAIL PROTECTED]
Automated List Manager                           [EMAIL PROTECTED]

Reply via email to