This is more of a request to change the TLS protocol, than an enhancement to 
OpenSSL.

DHE and ECDHE ciphers provide PFS to protect against compromised public 
key-pairs.

However, if a MITM has the same certificate, signed by a trusted certificate 
authority, then most bets are off.

Client-authentication can provide additional protection against MITM attacks, 
and allow servers to identify if a MITM is interfering with a valid user.
--
-Todd Short
// tsh...@akamai.com<mailto:tsh...@akamai.com>
// “One if by land, two if by sea, three if by the Internet."

On Mar 11, 2015, at 8:28 AM, Shawn Fernandes via RT 
<r...@openssl.org<mailto:r...@openssl.org>> wrote:

Hi,
At the moment, we have SSL handshake making use of a single certificate, using 
a single key-pair present in the certificate.
In the event the MITM has the same certificate(SSL - offloader) then the data 
can be encrypted/decrypted.
Would like to know if we can have the enhancement of using random key pair, 
generated form each certificate, so that each SSL handshake would make use of a 
random key-pair, and thereby give a different key value to each encryption 
-decryption, and therby be able to determine if the MITM with a same 
certificate has decrypted & encrypted data.
With Regards,
Shawn

_______________________________________________
openssl-dev mailing list
To unsubscribe: 
https://urldefense.proofpoint.com/v2/url?u=https-3A__mta.openssl.org_mailman_listinfo_openssl-2Ddev&d=AwICAg&c=96ZbZZcaMF4w0F4jpN6LZg&r=QBEcQsqoUDdk1Q26CzlzNPPUkKYWIh1LYsiHAwmtRik&m=ds4i2k1LUtsCfZgPMHS2VdrUvh5w6_xSLfNdm1vpRPo&s=kEns4AYdLMO2_ASqWmVdf9jEzb8yMzvELxKIbzr6Mqc&e=


_______________________________________________
openssl-dev mailing list
To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-dev

Reply via email to