Maybe I'm a bit naïve in this department, but isn't the following pretty
well fact:

1 - MitM attacks were initially born from Wireless Network Hacking, not on
location.
2 - A good business based Switch or Firewall, properly configured can and
will prevent / alert against most inhouse hacks / exploits.
3 - The skills needed to pull a hack of this sort would basically mean that
at one point your company hired a professional security expert, thus opening
the door anyways?

99.9999% of computer users wouldn't know where to start when it comes to
hacking SSL. They don't understand the client / server communication nor do
they understand the encryption algorithms.

I've personally got a couple security guys I use to handle audits for my
clients and though they have ways of pulling this off, it's extremely
difficult... and it's all they do.

!k

-----Original Message-----
From: Dave Watts [mailto:[EMAIL PROTECTED] 
Sent: Thursday, October 05, 2006 11:13 AM
To: CF-Talk
Subject: RE: Break it down for n00bs: security problems of non-SSL intrane
t?

> Ok, I think I've made it clear that a mitm does not have to 
> modify payloads in order to be successful ...

Wouldn't the payloads need to be modified, if they're encrypted using SSL?
If you trick the client into talking to your machine instead of the intended
host, and you present a certificate that isn't identical to the intended
host's certificate, you would need to decrypt the content with your
certificate. You'd then have to encrypt that content with the intended
host's certificate. While the actual data you're interested in reading will
not have changed, the information in the packet you received from the client
will not be the same as the information in the one you send to the intended
host, right? That seems to me to be the behavior of a proxy, not a router.
Routers rewrite transport layer stuff, but you'd need to rewrite application
layer stuff (I think those are the two relevent OSI layers, but I'm too lazy
to check).

And, I'm not trying to upset you or anything. I'm genuinely interested in
figuring this out. You mentioned previously that it would be possible to
either use the intended host's certificate or present a certificate of your
own that doesn't trigger a warning message on the client. Did I understand
you correctly? If so, can you point to anything about that at all? If not, I
apologize for misinterpreting you. Thanks!

Dave Watts, CTO, Fig Leaf Software
http://www.figleaf.com/

Fig Leaf Software provides the highest caliber vendor-authorized
instruction at our training centers in Washington DC, Atlanta,
Chicago, Baltimore, Northern Virginia, or on-site at your location.
Visit http://training.figleaf.com/ for more information!



~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~|
Introducing the Fusion Authority Quarterly Update. 80 pages of hard-hitting,
up-to-date ColdFusion information by your peers, delivered to your door four 
times a year.
http://www.fusionauthority.com/quarterly

Archive: 
http://www.houseoffusion.com/groups/CF-Talk/message.cfm/messageid:255690
Subscription: http://www.houseoffusion.com/groups/CF-Talk/subscribe.cfm
Unsubscribe: http://www.houseoffusion.com/cf_lists/unsubscribe.cfm?user=89.70.4

Reply via email to