What does TLS bring to the table if the authentication mechanism generates
a secure session key?  Crypto libraries are a dime a dozen.


On Thursday, October 16, 2014, marius adrian popa <map...@gmail.com> wrote:

> Jim i wasn't talking about the auth part that is solved  i was thinking
> about the encrypted data channel
>
> On Mon, Oct 13, 2014 at 5:23 PM, Jim Starkey <j...@jimstarkey.net
> <javascript:_e(%7B%7D,'cvml','j...@jimstarkey.net');>> wrote:
>
>>  Why on earth would someone authenticate with SRP then drop in TLS?
>>
>> TLS/SSL was designed to authenticate a server to an anonymous client,
>> which it does very well.  But if the client has an account/password pair,
>> TLS/SSL is unnecessary, is unreasonably expensive in round trips, and is
>> unnecessarily insecure.
>>
>> The essential problem with TLS is that it uses a public key crypto
>> system, aka PKIS aka certificates, to exchange session keys.  If the
>> server's certificate's private key is exposed by accident, leak, hack, or
>> governmental authority, anyone with that key can decrypt all past and
>> future sessions that use that certificate.  In the United States, a company
>> is legally obliged to surrender keys on secret demand from the FBI.  Once
>> the company has complied, all sessions on that key are blown -- and the
>> company is forbidden to warn other customers.
>>
>> SRP performs mutual authentication between client and server in a single
>> round trip which can piggy back on the initial connection protocol packet.
>> In the process, it generates a completely secure key that can be used as a
>> session key to encrypt the next packet to the server.  If the server
>> validates the first encrypted message, the handshake is done.  And, even
>> better, the session key exists only in memory on the client and server, so
>> there is never anything to fork over to a snooping government.
>>
>> SRP/RC4 is robust, efficient, secure, and provides perfect forward
>> security.  TLS is none of these.
>>
>>
>>
>>
>> On 10/13/2014 5:22 AM, marius adrian popa wrote:
>>
>>  My guess is that after srp auth we can create a secure tls channel
>>
>>  usually is solved by creating and opening another port  like 4443 or
>> with protocol modifications using the firebird port
>>
>>
>> http://superuser.com/questions/567594/how-to-set-up-a-server-to-use-tls-srp-authentication
>>
>>
>>  http://matthewarcus.wordpress.com/2014/05/10/srp-in-openssl/
>>
>>
>>  ps: we can start using openssl even if only need to mention it
>>
>>
>> http://stackoverflow.com/questions/6720610/when-and-where-to-mention-usage-of-openssl
>>  http://en.wikipedia.org/wiki/OpenSSL#Licensing
>>
>>  pps: or i would use the boringssl from cromium/android
>> https://www.imperialviolet.org/2014/06/20/boringssl.html
>>
>> http://arstechnica.com/security/2014/06/google-unveils-independent-fork-of-openssl-called-boringssl/
>>
>>
>> ------------------------------------------------------------------------------
>> Meet PCI DSS 3.0 Compliance Requirements with EventLog Analyzer
>> Achieve PCI DSS 3.0 Compliant Status with Out-of-the-box PCI DSS Reports
>> Are you Audit-Ready for PCI DSS 3.0 Compliance? Download White paper
>> Comply to PCI DSS 3.0 Requirement 10 and 11.5 with EventLog 
>> Analyzerhttp://p.sf.net/sfu/Zoho
>>
>>
>>
>> Firebird-Devel mailing list, web interface at 
>> https://lists.sourceforge.net/lists/listinfo/firebird-devel
>>
>>
>>
>>
>> ------------------------------------------------------------------------------
>> Meet PCI DSS 3.0 Compliance Requirements with EventLog Analyzer
>> Achieve PCI DSS 3.0 Compliant Status with Out-of-the-box PCI DSS Reports
>> Are you Audit-Ready for PCI DSS 3.0 Compliance? Download White paper
>> Comply to PCI DSS 3.0 Requirement 10 and 11.5 with EventLog Analyzer
>> http://p.sf.net/sfu/Zoho
>> Firebird-Devel mailing list, web interface at
>> https://lists.sourceforge.net/lists/listinfo/firebird-devel
>>
>>
>

-- 
Jim Starkey
------------------------------------------------------------------------------
Comprehensive Server Monitoring with Site24x7.
Monitor 10 servers for $9/Month.
Get alerted through email, SMS, voice calls or mobile push notifications.
Take corrective actions from your mobile device.
http://p.sf.net/sfu/Zoho
Firebird-Devel mailing list, web interface at 
https://lists.sourceforge.net/lists/listinfo/firebird-devel

Reply via email to