Kocher did work on the SSL v3.0 protocol, which corrects some errors in the previous version. At the risk of repeating myself, timing or power analysis attacks are not mounted against SSL, but against the public key operations. Given the nature of their place in the protocol, and that -- even if you could use a server as an oracle -- it is exceedingly difficult to time things precisely, the attack is primarily of academic significance.
Timing analysis is of such little practical value that no one, to my knowledge, is willing to obscure the average key agreement (DH) or decryption (RSA) operation by adding random delays or by making all pubkey operations conform to the upper bound, worst case time. ______________________________________________________________________ OpenSSL Project http://www.openssl.org User Support Mailing List [EMAIL PROTECTED] Automated List Manager [EMAIL PROTECTED]