RE: Chicken and egg issue

2005-12-30 Thread David Schwartz
> How can I make the new node (A) send an encrypted request to the > already existing node (B) while node A does not have any public > key/certificate information about the already existing node (B), and > still make sure that I am actually talking to B, and not some > Man-In-The-Middle ? > > Than

Re: Chicken and egg issue

2005-12-30 Thread Kyle Hamilton
Is there a way to do an ephemeral (i.e., unauthenticated) encryption channel before transmitting whatever certificates are to be used for authentication? I tend to look at certificate disclosure as an "information leakage" issue, that gives Eve more information than she really has any business hav

Re: Chicken and egg issue

2005-12-30 Thread Dr. Stephen Henson
On Fri, Dec 30, 2005, Kyle Hamilton wrote: > Is there a way to do an ephemeral (i.e., unauthenticated) encryption > channel before transmitting whatever certificates are to be used for > authentication? I tend to look at certificate disclosure as an > "information leakage" issue, that gives Eve m

RE: Chicken and egg issue

2005-12-30 Thread David Schwartz
> On Fri, Dec 30, 2005, Kyle Hamilton wrote: > Yes, you start with an unauthenticated ciphersuite (for example > anon-DH) and > then renegotiate the session. The initial handshake is sent in > the clear, the > second one would use the existing ciphersuite. > > That wont thwart a man in the middle

RE: Chicken and egg issue

2005-12-30 Thread David Schwartz
> Is there a way to do an ephemeral (i.e., unauthenticated) encryption > channel before transmitting whatever certificates are to be used for > authentication? I tend to look at certificate disclosure as an > "information leakage" issue, that gives Eve more information than she > really has any b

a question about building openssl

2005-12-30 Thread George R Goffe
Howdy, I have looked a little on the web sites for the answer to this question but don't see one redily available. I am building openssl on a redhat 9 system. My question is, "why is /usr/local/bin hardcoded througout the distribution?" RedHat installs perl it in /usr/bin and I have to fool around

Re: Chicken and egg issue

2005-12-30 Thread Kyle Hamilton
Actually, he did answer my question precisely. I asked if there was a way to create an ephemerally (i.e., unauthenticated) encrypted session, after which I could exchange certificates. My intent is to thwart Eve (the eavesdropper... i.e., the sysadmin who is doing network monitoring, as an exampl

Re: Chicken and egg issue

2005-12-30 Thread Kyle Hamilton
On 12/30/05, David Schwartz <[EMAIL PROTECTED]> wrote: > > If you think disclosing public keys is an information leakage issue, > you > don't trust the encryption you are using. I'd be extremely suspect about the > depth of your understanding of what actually goes on in an authentication.

Re: Chicken and egg issue

2005-12-30 Thread Dr. Stephen Henson
On Fri, Dec 30, 2005, Kyle Hamilton wrote: > > Now, I am aware that a "man-in-the-middle" attack exists, whereby a > malicious third party (Mallory) could accept a connection and > negotiate an unauthenticated-but-encrypted channel, and receive the > certificate information that I don't want to b

memory leak while using 0.9.7a?

2005-12-30 Thread googledoogle (sent by Nabble.com)
I compiled and tried a simple server code listed for openssl server on http://www.metalshell.com/view/source/108/.   The test system is running Linux Fedora Core 2 with openssl 0.9.7a.  The server code compiles and runs fine.  However, when I created a test client that continuously connect to the

Re: Chicken and egg issue

2005-12-30 Thread Kyle Hamilton
On 12/30/05, Dr. Stephen Henson <[EMAIL PROTECTED]> wrote: > If you don't want the server's certificate to be eavesdroppable that's tricky > because an attacker could simply connect to the server using (in this example) > anon-DH and drop the connection after it has received the server's certifica

RE: Chicken and egg issue

2005-12-30 Thread David Schwartz
> Actually, he did answer my question precisely. > I asked if there was a way to create an ephemerally (i.e., > unauthenticated) encrypted session, after which I could exchange > certificates. Correct. But how would an encypted session with an adversary help you? > My intent is to thw

Re: Chicken and egg issue

2005-12-30 Thread Kyle Hamilton
On 12/30/05, David Schwartz <[EMAIL PROTECTED]> wrote: > > > Actually, he did answer my question precisely. > > > I asked if there was a way to create an ephemerally (i.e., > > unauthenticated) encrypted session, after which I could exchange > > certificates. > > Correct. But how would an e