On 03/11/2015 01:28 PM, Shawn Fernandes via RT wrote:
Hi,
At the moment, we have SSL handshake making use of a single certificate, using 
a single key-pair present in the certificate.
In the event the MITM has the same certificate(SSL - offloader) then the data 
can be encrypted/decrypted.
Would like to know if we can have the enhancement of using random key pair, 
generated form each certificate, so that each SSL handshake would make use of a 
random key-pair, and thereby give a different key value to each encryption 
-decryption, and therby be able to determine if the MITM with a same certificate 
has decrypted & encrypted data.
With Regards,
Shawn

I'm not an expert here, but I must share a couple of considerations that the master of cryptography may want to reject or amend:

- if we're talking of non-mutual X509 authentication, that is just the server has a certificate, the solution would be ineffective against a determined attacker who possesses the server certificate because it would be possible, for the MITM, to fully impersonate the server. The MITM would talk with both parts using random keys

- as a general security perspective, it is always bad when a private key is compromised. Mutual authentication would help, yes, but you're navigating dangerous waters anyway

- the TLS-SRP, in my understanding, involves a pre-shared secret which is not, most often, a viable solution


_______________________________________________
openssl-dev mailing list
To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-dev

Reply via email to