Re: SSL attack scenario

2009-05-19 Thread João Távora
Given a NDA forbids me from giving you more details let me give you an analogy with postal services: I assume you know of postal services where you can get a delivery receipt. you can get a receipt that the recipient was notified, if the postman gets shot along the way, the postal service will

Re: SSL attack scenario

2009-05-19 Thread Yves Rutschle
On Tue, May 19, 2009 at 10:53:05AM +0200, João Távora wrote: Given a NDA forbids me from giving you more details let me give you an analogy with postal services: I assume you know of postal services where you can get a delivery receipt. you can get a receipt that the recipient was notified,

Re: SSL attack scenario

2009-05-19 Thread João Távora
The equivalent of application acknowledgment would be the *letter* saying to the person once you read this, return the attached form. Then you need the application has read the message and done something about it. Certainly. But I don't need this. I just need registered mail, that is be

RE: SSL attack scenario

2009-05-19 Thread Dave Thompson
From: owner-openssl-us...@openssl.org On Behalf Of Ger Hobbelt Sent: Monday, 18 May, 2009 13:04 Quite a bit has been covered in the answers so far, but there's still some material left. Apparently. Much that I agree with, or is redundant, snipped. Considering the 'guaranteed delivery'

RE: SSL attack scenario

2009-05-19 Thread David Schwartz
João Távora wrote: Given a NDA forbids me from giving you more details let me give you an analogy with postal services: I assume you know of postal services where you can get a delivery receipt. you can get a receipt that the recipient was notified, if the postman gets shot along the way,

Re: SSL attack scenario

2009-05-19 Thread Michael S. Zick
On Tue May 19 2009, Dave Thompson wrote: From: owner-openssl-us...@openssl.org On Behalf Of Ger Hobbelt Sent: Monday, 18 May, 2009 13:04 - - - snip - - - c) the 'guaranteed delivery' I mentioned before: VMS offers this as a message-based protocol, but you can easily convert that

Re: SSL attack scenario

2009-05-18 Thread Chris Gray
- What this article says is this: if you *received* data from TCP connection it will be without duplication or losing data. It doesn't say: if you *send* data it will be received correctly by other host. It's impossible to garantee. -- Andrey Koltsov With TCP you basically don't know

Re: SSL attack scenario

2009-05-18 Thread Nikos Balkanas
:59 AM Subject: Re: SSL attack scenario JoΓ£o TΓ΅vora ΠΏΠΈΡ�ΠµΡ‚: What this article says is this: if you *received* data from TCP connection it will be without duplication or losing data. It doesn't say: if you *send* data it will be received correctly by other host. It's impossible

Re: SSL attack scenario

2009-05-18 Thread Steffen DETTMER
* Nikos Balkanas wrote on Mon, May 18, 2009 at 15:29 +0300: Wikipedia is right in principle, but doesn't cover the case of TCP hijacking. I think this is out of scope, TCP is said to be reliable, not neccesarily secure. oki, Steffen --[ end of message

RE: SSL attack scenario

2009-05-18 Thread David Schwartz
João wrote: TCP does not provide delivery assurance. If the application needs to know the data got through, it must use application-level ackwowledgements. SSL does not change this and provides the same set of guarantees and assurances TCP does. I'm sorry to disagree but TCP,

Re: SSL attack scenario

2009-05-18 Thread Ger Hobbelt
On Sun, May 17, 2009 at 8:22 PM, João Távora joaotav...@gmail.com wrote: Maybe I didn't really fully explain myself, the problem is not really ensuring secrecy and integrity, it's ensuring delivery. [...] In this case the attacker would have tampered with the delivery assurance of TCP but none

Re: SSL attack scenario

2009-05-18 Thread Ger Hobbelt
On Mon, May 18, 2009 at 6:26 PM, David Schwartz dav...@webmaster.com wrote: [...] Whoops. I was writing my response while David's made it already across. His is shorter and saying exactly the same. ACKs are not important. There's message, there's stream and the security breach. The latter does

Re: SSL attack scenario

2009-05-18 Thread Kyle Hamilton
2009/5/18 Nikos Balkanas nbalka...@gmail.com: It would require a lot of effort, but a transparent proxy, can rewrite IP source headers, sequence numbers, ACKs and if it has followed all algos and key exchanges, even regenerate those. HMAC is nothing more than a glorified CRC encoded with some

Re: SSL attack scenario

2009-05-18 Thread Dr. Stephen Henson
On Mon, May 18, 2009, Kyle Hamilton wrote: Both of which are described as hard problems. It's not known whether they qualify as NP-complete, but they definitely qualify as NP-hard (NP meaning 'nonpolynomial time', or 'the amount of time required to do it is logarithmic with how much

Re: SSL attack scenario

2009-05-18 Thread João Távora
David, I think we're drifting a little bit from my original question here. I certainlly don't mean to imply that there's anything wrong with SSL or the OpenSSL's implementation, I just want to discover if it does what I want. TCP specifically does *not* communicate ACKs up to the

RE: SSL attack scenario

2009-05-18 Thread David Schwartz
Joao Tavora wrote: Certainly! I never said it did. TCP ensures delivery to the host, not the application. But it does ensure it up to the host, or if that cant be achieved the peer host is appropriately notified. Right, none of which has any application-level consequences. These are all

SSL attack scenario

2009-05-17 Thread João Távora
Hi, I've got a newbie question about a possible SSL/OpenSSL Consider two machines A and B and a man-in-the-middle, Z, who can snoop traffic. A and B exchange certificates securely, i.e. Z lets the SSL handshake through. Therefore A sends a first application-data message to B. Z cannot

Re: SSL attack scenario

2009-05-17 Thread Kyle Hamilton
No. Part of the SSL/TLS handshake protocol is the definition of what the content of the message should include -- i.e., the HMAC. If it doesn't exist or is different from what it's supposed to be, the side that failed to validate it sends a decryption_error fatal alert and closes the connection.

Re: SSL attack scenario

2009-05-17 Thread João Távora
Hi I'm glad for your negative answer and that's also what I suspect :-) ... but I didn't really understand why. Maybe I didn't really fully explain myself, the problem is not really ensuring secrecy and integrity, it's ensuring delivery. As I understand it this is normally done with TCP

RE: SSL attack scenario

2009-05-17 Thread David Schwartz
João wrote: Hi I'm glad for your negative answer and that's also what I suspect :-) ... but I didn't really understand why. Maybe I didn't really fully explain myself, the problem is not really ensuring secrecy and integrity, it's ensuring delivery. No protocol can ensure the other side

Re: SSL attack scenario

2009-05-17 Thread João Távora
TCP does not provide delivery assurance. If the application needs to know the data got through, it must use application-level ackwowledgements. SSL does not change this and provides the same set of guarantees and assurances TCP does. I'm sorry to disagree but TCP, unlike UDP, does

Re: SSL attack scenario

2009-05-17 Thread Kyle Hamilton
TCP allows for hijacking -- but the fact that the SSL/TLS layer uses secret, ever-changing HMACs means that an attacker cannot pass any data to the hijacked session without it being detected and a protocol error resulting. (Much less the encryption key for all but NULL ciphers.) TCP guarantees

Re: SSL attack scenario

2009-05-17 Thread Andrey Koltsov
João Távora пишет: TCP does not provide delivery assurance. If the application needs to know the data got through, it must use application-level ackwowledgements. SSL does not change this and provides the same set of guarantees and assurances TCP does. I'm sorry to disagree but TCP,