Edward Diener wrote:

> > 1) You need someone to confirm that having a client use a
> > known-compromised
> > private key to authenticate over SSL is no worse than the
> > client using no
> > key at all. It seems to me like you'd almost have to try to make this a
> > problem, but who knows -- maybe it's never been thought about.

> Whether a client private key is used or no client key at all, there is
> still the issue of figuring out the username/password.

No, there isn't. If using a known-compromised client key compromises the SSL
connection, then an attacker can get a username/password simply by reading
it out of a compromised SSL connection.

On another note, something still seems fundamentally wrong with your
approach. Since every customer has a username/password, and you don't trust
your customers, you still cannot allow someone to mess with an arbitrary
data just because he has a valid username/password.

Being able to find the guilty party after a compromise is certainly one part
of security. But when you design a security system, it's more important to
make compromise difficult.

No sane person would argue, "I don't need locks on my doors because I have a
camera pointing at it".

DS


______________________________________________________________________
OpenSSL Project                                 http://www.openssl.org
User Support Mailing List                    openssl-users@openssl.org
Automated List Manager                           majord...@openssl.org

Reply via email to