Hi,

I would enjoy hearing some opinions on the following
potential scenario :

The SSL-Client does no client-auth. and has to transmit
one string, that contains security-sensitive data.
Let's think of a man-in-the-middle you leaves through
the handshake-packets, but blocks the data-packets.
He then performs a brute-force-attack on the sent data,
and opens a completely new SSL-Connection with the server,
transmitting the data, that the server expects to receive
from the one real client.

I know, with client-auth. you could avoid this, but some
customers of our solution might not be able to configure
their server for client-auth. So how realistic do
you think this to be ?

Thanks,

Stephan 
--------------------------
Tel : +49 89 92699114
Fax : +49 89 92699226
mail: [EMAIL PROTECTED]
www : http://www.ecrc.de

Cable & Wireless ECRC GmbH
--------------------------
______________________________________________________________________
OpenSSL Project                                 http://www.openssl.org
User Support Mailing List                    [EMAIL PROTECTED]
Automated List Manager                           [EMAIL PROTECTED]

Reply via email to