On 12/30/05, David Schwartz <[EMAIL PROTECTED]> wrote:
>
> > Actually, he did answer my question precisely.
>
> > I asked if there was a way to create an ephemerally (i.e.,
> > unauthenticated) encrypted session, after which I could exchange
> > certificates.
>
>         Correct. But how would an encypted session with an adversary help you?

Because to accept a connection and negotiate encryption parameters is
a computationally-intensive task, there's no way it could be called
'just a fluke" or "not taking due diligence to protect your own
information".

My threat model is "someone on a network that I use is writing a piece
of network-related software that isn't working properly, so he uses a
packet capture device [of whatever type] to help him debug, and
inadvertently catches snippets of a conversation that I'm having that
I would prefer him not to know."

Just because I'm roommates with someone doesn't mean that I want him
to know my deepest, darkest secrets.

> > My intent is to thwart Eve (the eavesdropper... i.e., the sysadmin who
> > is doing network monitoring, as an example).  I am aware that Mallory
> > (the malicious peer who wants to be the MITM) could obtain the
> > credentials on the renegotiation; however, that requires an active
> > attempt to violate the security of the connection [and thus the
> > 'secrecy' of the contents of the certificates].
>
>         Exactly, so it doesn't help you.

It helps me, because before I exchange certificates, the connection is
already encrypted.  This would require more than a 'passive
monitoring', but rather an 'active attempt to interfere'.

>         What you really want is two rounds of identification. One with a
> certificate that doesn't contain any information you don't want to make
> public, just for authentication. Once you have authenticated, you can then
> present the certificate that contains the information you want to control.

I've been dealing with cryptography for 13 years.  Please don't
patronize me by attempting to tell me what I want.  While that would
deal with the Mallory situation referenced above, I'm NOT TRYING TO
PROTECT AGAINST MALLORY.

Sheesh.  One would think that "I am aware that..." would suggest that
the possibility has already been considered and found to be a
non-issue.

>         I strongly caution you against adopting any threat model that involves
> treating eavesdroppers differently from MITMs. It's easy enough with today's
> technology to provide the same protection, so it's usually foolish not to.
> YMMV.

MMDV.

>         You are still volunteering the information to any unauthenticated 
> entity
> that requests it. If the issue is really "it passed over my network
> unencrypted" how is "you give it to anyone indiscriminately" any different?
>
>         I guess I don't know what your threat model is. If it is impossible to
> authenticate with any other method, because you really do want to give the
> certificate to anyone, but only if they explicitly ask or use subterfuge to
> get it, maybe it could make sense.
>
>         Just understand that you have no actual security, just a legal 
> argument.
> It's like a sign that says "locked" rather than a lock.
>
>         DS

I'm being vague with my threat model on purpose.  There are reasons
I'm not concerned with MITMs.  Really.

-Kyle H
______________________________________________________________________
OpenSSL Project                                 http://www.openssl.org
User Support Mailing List                    openssl-users@openssl.org
Automated List Manager                           [EMAIL PROTECTED]

Reply via email to