On Tue, Jun 15, 1999 at 04:54:40PM +0200, Pierre De Boeck wrote:

> I think your concept of SSL/TLS sniffer is not realistic
> in a general way, for the following reasons:
> 
>       - the packets transmitted between a client and a server have submitted
>         a set of "transformations" (fragmentation, compression(optional)+
>         encryption(optional)+"MACed")
>       - to recover the original payload, you must, among other things, know
>               - the compression alg/param used if any
>               - the cipher alg.param used (e.g. RC2-CBC-40 with a specific IV)+
>                 the secret key
> 
> That information is shared by the two parties but obviously not transported
> in the packets.

Of course it's not trivial to read the encrypted payload data, but the
algorithm identifiers are transmitted in clear; so the attacker can
tell which connections use only 40-bit encryption keys, and -- if
enough computing power can be put into this -- can do key-searches for
those and then decrypt them.
______________________________________________________________________
OpenSSL Project                                 http://www.openssl.org
Development Mailing List                       [EMAIL PROTECTED]
Automated List Manager                           [EMAIL PROTECTED]

Reply via email to