This is competely wrong. You fail to see the network topology. The SSL request would
still have to go through MY SSL accelerator in order to reach the actual server.
There's no other route to take. Even if what you suggest would be attempted, or even
possible, the user's browser would get the correct certificate, albeit a second cert.
Erwann ABALEA wrote:
> No. A MITM attack can also occur even if you're using a crypto
> accelerator. The only way this attack cannot occur is if you ask for
> client authentication.
>
> - the sniffer generates a self-signed certificate with the same name as
> your server cert (www.secure.site)
> - the browser wants to connect to your site (www.secure.site), but
> instead connects to the sniffer (sniff.evil.domain)
> - the sniffer negociates the SSL session with the browser, by presenting
> the newly generated self-signed cert
> - the browser gets a warning claiming that the cert is invalid
> - the attack goes there: the user only clicks OK because he doesn't know
> anything about PKI
> - the sniffer then establishes a SSL session with your server, using your
> crypto accelerator if you want. In this exact case, the sniffer only
> acts as a valid customer browser, so this connection is perfectly
> valid.
> - the sniffer then routes all the data between the beowser and the
> server, but all this data is cleartext in it's own address space, and
> ciphered between (browser, sniffer) and (sniffer, server).
>
> So your cryptoboard cannot do anything against a dumb user being sniffed.
>
> Again: the attack has nothing to do with the server, or the cryptoboard
> the server might have.
>
> On Tue, 19 Dec 2000, Thomas Nichols wrote:
>
> > Quite the contrary. There is no method available for an MIIM to replace the SSL
> > cert as it can only reside where it is and is linked to private IP servers behind
> > the accelerator.
> > Erwann ABALEA wrote:
> >
> > > On Tue, 19 Dec 2000, Thomas Nichols wrote:
> > >
> > > > The best method is to not have the SSL certificate and key on the server to
> > > > begin with. I use a non-ip based ssl accelerator.
> > >
> > > This not a protection against this attack.
> > >
> > > This attack doesn't steal the private key of the host, it only relies on
> > > the "dumbness" of the users, which only clicks "OK" when a warning pops up
> > > (considering that the user doesn't know anything about PKI).
> > >
> > > This attack is not against SSL, or SSH, but only against the users.
>
> --
> Erwann ABALEA
> [EMAIL PROTECTED]
> RSA PGP Key ID: 0x2D0EABD5
> ------
> Against stupidity, the Gods themselves, contend in vain!
>
> ______________________________________________________________________
> OpenSSL Project http://www.openssl.org
> User Support Mailing List [EMAIL PROTECTED]
> Automated List Manager [EMAIL PROTECTED]
______________________________________________________________________
OpenSSL Project http://www.openssl.org
User Support Mailing List [EMAIL PROTECTED]
Automated List Manager [EMAIL PROTECTED]