On Tue, Jun 15, 1999 at 04:54:40PM +0200, Pierre De Boeck wrote:
> I think your concept of SSL/TLS sniffer is not realistic
> in a general way, for the following reasons:
>
> - the packets transmitted between a client and a server have submitted
> a set of "transformations" (fragmentation, compression(optional)+
> encryption(optional)+"MACed")
> - to recover the original payload, you must, among other things, know
> - the compression alg/param used if any
> - the cipher alg.param used (e.g. RC2-CBC-40 with a specific IV)+
> the secret key
>
> That information is shared by the two parties but obviously not transported
> in the packets.
Of course it's not trivial to read the encrypted payload data, but the
algorithm identifiers are transmitted in clear; so the attacker can
tell which connections use only 40-bit encryption keys, and -- if
enough computing power can be put into this -- can do key-searches for
those and then decrypt them.
______________________________________________________________________
OpenSSL Project http://www.openssl.org
Development Mailing List [EMAIL PROTECTED]
Automated List Manager [EMAIL PROTECTED]