Hi *,

imagine the following scenario:

Server: has its own private/public-key pair
Client: has the public-key of the server
Man-in-the-middle: has the public-key of the server

If the client asks the server for a secure connection, the server starts its
handshake by sending a suggestion of a private-private-key encryption
(encrypted with its private-key).

Right so far?

Is it possible for the man-in-the-middle to eavesdrop the handshake sequence
of server and client, to decrypt it with the servers public-key and to get
the private-key of the server-client SSL session for a man-in-the-middle
attack?

In other words, is it possible to etablish a secure connection in this
scenario at all events or do one need necessarily a private/public-key pair
on the client-side?

Thx in advance

Stefan Hans





______________________________________________________________________
Apache Interface to OpenSSL (mod_ssl)                   www.modssl.org
User Support Mailing List                      [EMAIL PROTECTED]
Automated List Manager                            [EMAIL PROTECTED]

Reply via email to