Well, my eyes did glaze over somewhere betw thermodynamics and mobile
perpetuum ;-)
So does this mean that if I work in a less sophisticated infrastructure
where only 56kbps ppp dialup is available, I can get some incremental gain
by zipping it up before encrypting it ? [yes/no]
Caveats ?
And here is where I really get it, with this next question :
I've got all this openssl key stuff working, and signed my own cert using
openssl.
On starting Netscape6.2 I got the little lock to close. I got Netscape to
register my own site as a trusted site in "WebSites"
But I want Netscape to load my certificate as an "Authority" for our testing
purposes.
How does one go about doing that, both in Netscape and MSIE5 ?
TIA :-)


----- Original Message -----
From: "Dave Paris" <[EMAIL PROTECTED]>
To: <[EMAIL PROTECTED]>
Sent: Tuesday, August 19, 2003 07:58 PM
Subject: RE: configuration question


> In addition to Owen's salient points about compression working efficiently
> on repetitive strings in plaintext/binary data (e.g. whitespace in a Word
> document) and not on random data (e.g. encrypted data), some encryption
> algorithms can actually be weakened by compressing the resulting data,
> giving a cryptanalyzer clues to the inner workings of the algorithm.
>
> The bottom line here is that SSL works on the socket/transport layer and
not
> at the application layer.  If you're generating a .gz file on-the-fly
within
> Apache (mod_gzip, etc), the result will still be encrypted *after*
> compression.  The output chain of Apache applies SSL as the last stage, so
> something like mod_gzip will operate *before* SSL.  Most modern browsers
> produced in the last four or five years will decompress a .gz file (not
> .zip!) for the user - even on Windows (just tested IE6 on XP .. works
fine).
> If you've ever experimented with VRML, one "best practices" is to send
files
> as .wrl.gz and not straight .wrl.
>
> As for SSL packets being larger - they're not to any appreciable degree -
> for the exact reason Owen pointed out below.  Even symmetric cipher
> algorithms don't produce appreciably larger amounts of data.  For example,
> using Chained Block Cipher (CBC) mode will only increase the amount of
data
> by 8 bytes from adding an Initialization Vector (IV) to the beginning of
the
> ciphertext and padding the end of the ciphertext to get a complete final
> block (with an 8 byte block cipher like Blowfish, the largest amount of
> padding will only be 7 bytes).  So, at most, you've added 15 bytes to even
> the largest amount of plaintext data using Blowfish in CBC mode.  There
are
> a few exotic exceptions here, like interleaved chaining block ciphers
which
> will add an IV (of the same size as above) per parallel operation (so if
> you've got four parallel encryption operations using interleaved CBC,
you're
> adding 24 bytes at the beginning of the ciphertext).  However, these are
> exceptionally rare and typically limited to proprietary
> implementations/applications.
>
> Addressing one other misconception here.. a packet can contain up to 1500
> bytes - including headers (assuming your network handles MTUs of 1500,
some
> are less (like ATM @ 53 bytes [48 bytes of payload w/5 bytes of header),
> some are more (like Frame Relay @ up to 4500 bytes), but hey, not many
> desktops are connected with ATM or Frame, so we'll call the connection
> standard ethernet with a MTU of 1500.  The way networks operate and
packets
> are forwarded, smaller packets actually transmit *less* data for any given
> amount of time over larger packets.  Switches and routers (OSI layer 2 and
3
> devices) operate on packet forwarding rates, regardless of the amount of
> data in the packet.  The more data in the packet, the more data you're
going
> to get for X period of time - this is one factor that introduces latency
> into a network.  Lots of small packets going through a network simply
> transmit less data than lots of large packets .. and since the only
> appreciable metric is the number of packets and the packet forwarding rate
> of the network device, the larger the packet, the happier the network and
> the more data getting to the end user.  The *only* place this is going to
> make a difference is if you've got an -inline- intrusion
> detection/prevension system (IDS/IPS), in which case you've got what most
> network engineers would consider to be a design flaw anyway.  In this
case,
> each packet needs to be inspected and the more data there is, the more
there
> is to be inspected.  Most IDS sensors will simply discard packets being
> inspected rather than slow the network down (Snort does this when it's
> either misconfigured or overloaded).
>
> So.. go for it.  Use mod_gzip (or similar) to generate .gz docs on the fly
> .. let Apache handle your SSL.  If anything, your win comes from SSL
having
> to encrypt *less* data.  This won't speed up the handshake phase, but will
> speed up the rest of the transaction since there's simply less data to
> encrypt and transmit.  How much speed improvement you get is completely
> dependent on how much compression you're getting.  If you can take a 100K
> document and compress it to 25K, that's a 75% reduction in the amount of
> data SSL needs to encrypt and reduces the number of packets from about 66
to
> around 16 - again, not including the SSL handshake/setup and general TCP
> setup/teardown.
>
> If you're bogging down your server with all the SSL transactions, look at
> investing in a SSL accelerator.  If your business model depends on both
> security *and* performance, then the cost (starting around 20K$USD) should
> be easily justified.  But that's the subject of another mail and I've got
> some coffee getting cold over here. ;-)
>
> Hope this didn't glaze your eyes over. :-)
> Best~
> -dsp
>
>
> -----Original Message-----
> From: [EMAIL PROTECTED]
> [mailto:[EMAIL PROTECTED] Behalf Of Boyle Owen
> Sent: Tuesday, August 19, 2003 7:02 AM
> To: [EMAIL PROTECTED]
> Subject: RE: configuration question
>
>
>
>
> >-----Original Message-----
> >From: Arthur Chan [mailto:[EMAIL PROTECTED]
> >
> >Hi Boyle,
> >I've been debating with myself over whether to encrypt
> >everything, that's a
> >cogent argument you have offered. I have a few questions myself :
> >(1) assuming an openssl encrypted packet is bigger than a
> >plain text one,
>
> Why would you assume this? Essentially;
>
> encrypted_text = f(plain_text, key)
>
> where f() is a mathematical function. I guess the 2nd law of
thermodynamics
> ("entropy increases") would tend to cause the output to increase but not
> necessarily by much. In the simple case of a substitutional cipher, the
> encrypted text would be precisely the same size as the plain text.
>
> >would mod_gzip shrink it significantly to warrant the effort?
>
> Zipping algorithms work by replacing repetitive sequences in the input
with
> shorter instructions to regenerate them (e.g. 1000 blue pixels -> "1 blue
> pixel x 1000"). Compression works best with highly structured input data
> (bitmaps, WAV files, human language etc). With random data, it can't make
> much difference and will even cause the file to grow! (try repeatedly
> zipping a file to see this happening).
>
> >(2) and would that slow down the client browser display of content ?
>
> Unzipping requires the client to have winzip - not a default on a windows
> client! Probably this would slow the whole thing down.
>
> Remember that SSL is well-defined on the web and all recent browsers
contain
> fast and effective SSL software - I would trust it to do its job and not
try
> to re-invent the wheel.
>
> Rgds,
> Owen Boyle
> Disclaimer: Any disclaimer attached to this message may be ignored.
>
> >On the other hand, with these new  1GHz+ P4 desk- and lap-tops
> >around, maybe
> >not.
> >
> >----- Original Message -----
> >From: "Boyle Owen" <[EMAIL PROTECTED]>
> >To: <[EMAIL PROTECTED]>
> >Sent: Tuesday, August 19, 2003 04:49 PM
> >Subject: RE: configuration question
> >
> >
> >>-----Original Message-----
> >>From: Henrik Bentel [mailto:[EMAIL PROTECTED]
> >>
> >>I have a web app which serves both static and non static content, both
> >>secure and unsecure(https and http).
> >>Now, all my ssl configuration is under my secure virtual host,
> >>such that it applies to everything. However, I have quite a bit static
> >>content(images, css, javascript.,...) which doesn't need to be very
> >secure. I
> >>somewhat only want to secure my dynamic content.
> >
> >To add to Cliff's comment about browsers complaining about the mix of
> >secure an insecure content there is a genuine security reason for *not*
> >doing what you propose.
> >
> >Put yourself in the position of a crook who has gained access to the
> >datastream flowing into your SSL server. As you are probably aware, all
> >encryption ciphers can be cracked by a brute force attack (making
> >repeated attempts at guesssing the key). Hopefully, the time-to-crack
> >will be "long", but you don't know how fast the crook's computer is. If
> >he works for the NSA, it might be very fast indeed. If you serve all
> >content via SSL, he has no idea which packets are important and which
> >are just images etc. so he has to crack everything. If you decide to
> >save a teeny bit of processing on the server by encrypting only the
> >important things, he then sees lots of "en clair" packets (containing
> >image data etc.) which he can safely ignore and only a few occasional
> >nuggets of encrypted data which he can be sure are worth cracking. Thus
> >he can focus his efforts on these. Therefore, you make life
> >easy for the
> >cracker by highlighting the packets that are worth cracking! In other
> >words, the best place to hide a leaf is in the forest.
> >
> >You shouldn't need to worry about the processing load of the SSL
> >encryption. If it is slowing your server, then, frankly, your server is
> >not powerful enough to serve the traffic you have - get more memory,
> >upgrade the chipset, do whatever is necessary to get up to speed.
> >
> >Rgds,
> >Owen Boyle
> >Disclaimer: Any disclaimer attached to this message may be ignored.
> >
> >>But, I don't want to generate absolute URLs on the fly to link to
> >>non-secure static content. What I want is to make request to
> >>certain urls
> >>"less secure" such that processing is faster. For example, I have a
> >>directory called art, which is just a defined alias for a
> >>directory. Is
> >>there a way to make ssl processing for this directory less
> >>restrictive than
> >>for the "generic requests" to the virtual host so that
> >>processing is faster?
> >>
> >>Home someone can help
> >>
> >>Henrik Bentel
> >>
> >>______________________________________________________________________
> >>Apache Interface to OpenSSL (mod_ssl)                   www.modssl.org
> >>User Support Mailing List                      [EMAIL PROTECTED]
> >>Automated List Manager                            [EMAIL PROTECTED]
> >>
> >Diese E-mail ist eine private und persönliche Kommunikation. Sie hat
> >keinen Bezug zur Börsen- bzw. Geschäftstätigkeit der SWX Swiss
> >Exchange.
> >This e-mail is of a private and personal nature. It is not related to
> >the exchange or business activities of the SWX Swiss Exchange. Le
> >présent e-mail est un message privé et personnel, sans rapport avec
> >l'activité boursière de la SWX Swiss Exchange.
> >
> >This message is for the named person's use only. It may contain
> >confidential, proprietary or legally privileged information. No
> >confidentiality or privilege is waived or lost by any mistransmission.
> >If you receive this message in error, please notify the sender urgently
> >and then immediately delete the message and any copies of it from your
> >system. Please also immediately destroy any hardcopies of the message.
> >You must not, directly or indirectly, use, disclose, distribute, print,
> >or copy any part of this message if you are not the intended recipient.
> >The sender's company reserves the right to monitor all e-mail
> >communications through their networks. Any views expressed in this
> >message are those of the individual sender, except where the message
> >states otherwise and the sender is authorised to state them to be the
> >views of the sender's company.
> >
> >
> >______________________________________________________________________
> >Apache Interface to OpenSSL (mod_ssl)                   www.modssl.org
> >User Support Mailing List                      [EMAIL PROTECTED]
> >Automated List Manager                            [EMAIL PROTECTED]
> >
> >______________________________________________________________________
> >Apache Interface to OpenSSL (mod_ssl)                   www.modssl.org
> >User Support Mailing List                      [EMAIL PROTECTED]
> >Automated List Manager                            [EMAIL PROTECTED]
> >
> Diese E-mail ist eine private und persönliche Kommunikation. Sie hat
keinen
> Bezug zur Börsen- bzw. Geschäftstätigkeit der SWX Swiss Exchange. This
> e-mail is of a private and personal nature. It is not related to the
> exchange or business activities of the SWX Swiss Exchange. Le présent
e-mail
> est un message privé et personnel, sans rapport avec l'activité boursière
de
> la SWX Swiss Exchange.
>
> ______________________________________________________________________
> Apache Interface to OpenSSL (mod_ssl)                   www.modssl.org
> User Support Mailing List                      [EMAIL PROTECTED]
> Automated List Manager                            [EMAIL PROTECTED]
>
>
>
> ______________________________________________________________________
> Apache Interface to OpenSSL (mod_ssl)                   www.modssl.org
> User Support Mailing List                      [EMAIL PROTECTED]
> Automated List Manager                            [EMAIL PROTECTED]

______________________________________________________________________
Apache Interface to OpenSSL (mod_ssl)                   www.modssl.org
User Support Mailing List                      [EMAIL PROTECTED]
Automated List Manager                            [EMAIL PROTECTED]

Reply via email to