Also, there is no crypto-board.

Erwann ABALEA wrote:

> No. A MITM attack can also occur even if you're using a crypto
> accelerator. The only way this attack cannot occur is if you ask for
> client authentication.
>
>  - the sniffer generates a self-signed certificate with the same name as
>    your server cert (www.secure.site)
>  - the browser wants to connect to your site (www.secure.site), but
>    instead connects to the sniffer (sniff.evil.domain)
>  - the sniffer negociates the SSL session with the browser, by presenting
>    the newly generated self-signed cert
>  - the browser gets a warning claiming that the cert is invalid
>  - the attack goes there: the user only clicks OK because he doesn't know
>    anything about PKI
>  - the sniffer then establishes a SSL session with your server, using your
>    crypto accelerator if you want. In this exact case, the sniffer only
>    acts as a valid customer browser, so this connection is perfectly
>    valid.
>  - the sniffer then routes all the data between the beowser and the
>    server, but all this data is cleartext in it's own address space, and
>    ciphered between (browser, sniffer) and (sniffer, server).
>
> So your cryptoboard cannot do anything against a dumb user being sniffed.
>
> Again: the attack has nothing to do with the server, or the cryptoboard
> the server might have.
>
> On Tue, 19 Dec 2000, Thomas Nichols wrote:
>
> > Quite the contrary. There is no method available for an MIIM to replace the SSL
> > cert as it can only reside where it is and is linked to private IP servers behind
> > the accelerator.
> > Erwann ABALEA wrote:
> >
> > > On Tue, 19 Dec 2000, Thomas Nichols wrote:
> > >
> > > > The best method is to not have the SSL certificate and key on the server to
> > > > begin with. I use a non-ip based ssl accelerator.
> > >
> > > This not a protection against this attack.
> > >
> > > This attack doesn't steal the private key of the host, it only relies on
> > > the "dumbness" of the users, which only clicks "OK" when a warning pops up
> > > (considering that the user doesn't know anything about PKI).
> > >
> > > This attack is not against SSL, or SSH, but only against the users.
>
> --
> Erwann ABALEA
> [EMAIL PROTECTED]
> RSA PGP Key ID: 0x2D0EABD5
> ------
> Against stupidity, the Gods themselves, contend in vain!
>
> ______________________________________________________________________
> OpenSSL Project                                 http://www.openssl.org
> User Support Mailing List                    [EMAIL PROTECTED]
> Automated List Manager                           [EMAIL PROTECTED]

______________________________________________________________________
OpenSSL Project                                 http://www.openssl.org
User Support Mailing List                    [EMAIL PROTECTED]
Automated List Manager                           [EMAIL PROTECTED]

Reply via email to