Hi,

On July 25, 2003 01:45 pm, David Schwartz wrote:
>       Hijacks and redirects are all within the scope of what a MITM can do.

No, they only within the scope of what an attacker can do. The attacker 
becomes a MITM if they can do it without you knowing anything's wrong. 
Note "doing it without you knowing anything's wrong" means one of two 
things; one is to manipulate data in such a way that the end parties do 
not know that data has been changed (or created) in transit 
(authenticity), and the other is to be able to read the encapsulated data 
(secrecy).

>       You want a simple definition of a MITM? Here it is -- you think you
> have:
>
>       server <-> network <-> client
>
>       But under a MITM attack, you really have:
>
>       server <-> MITM <-> client
>
>       The MITM can do anything he wants from his position, including pass
> the data unmolested, drop bytes, or change them in both directions.
> Hijacking and redirection all occur on the wire between the server and
> the client, so they're all within the scope of a MITM attack.
>
>       To put it simply, a MITM attack is any attack that can be performed by
> someone who has complete control over the network between the server
> and the client, that is, he is in the middle instead of a trusted
> network.
>
>       If you think MITM means something else, please present your
> definition. I have a feeling you'll find it becomes incoherent.

Your definition is a waste of time, I'm sorry to say. What you're saying 
leads logically to the trivial extreme that any network protocol passing 
through the internet is vulnerable to MITM attacks. If you're happy with 
that definition then this email thread is without point.

SSL/TLS never claims that it can prevent active traffic manipulation by 
undesirable parties, it just claims you'll know something's wrong when 
and if it happens and that all data passing through the SSL/TLS streams 
until that point will be both tamper-free and secret. Our definition of 
MITM is any attack that could passively or actively attack the 
communications such that you are none the wiser (or that you may have 
lost confidentiality or authenticity of data prior to knowing something 
was wrong).

FWIW: there are limited MITM possibilities in SSLv2 that fit your 
definition *and* ours, but that's a different issue. It seems that you 
are defining your statement to be correct and working backwards from 
there. The one true MITM attack seems to be this enormous email thread - 
consisting of one side working from a sensible definition of MITM towards 
conclusions, and another working from an tautological conclusion 
backwards towards an unreasonable definition of MITM.

Cheers,
Geoff

-- 
Geoff Thorpe
[EMAIL PROTECTED]
http://www.geoffthorpe.net/

______________________________________________________________________
OpenSSL Project                                 http://www.openssl.org
User Support Mailing List                    [EMAIL PROTECTED]
Automated List Manager                           [EMAIL PROTECTED]

Reply via email to