That's correct - that's why IBM is buying Bluecoat.
SSL is nothing to a Bluecoat.  Child's play :)

-----Original Message-----
From: Rich Salz [mailto:[EMAIL PROTECTED]
Sent: Tuesday, May 17, 2005 1:23 PM
To: Miles Bradford
Cc: 'openssl-users@openssl.org'
Subject: Re: simple question again


> Yes - you are correct...if that entity that does the interception is able
to
> handle that key without corrupting it - and gets in to the objective
server
> before the real sender establishes a connection.

Capture the key and use it at another time.

>  This kind of phishing and
> interception is not fast enough to do the interception, make contact and
> establish a legitimate connection all at once.

Sure it is.  I just need to buy a computer that's either a little faster 
than yours or just has less load than yours does.

        /r$

-- 
Rich Salz, Chief Security Architect
DataPower Technology                           http://www.datapower.com
XS40 XML Security Gateway   http://www.datapower.com/products/xs40.html
______________________________________________________________________
OpenSSL Project                                 http://www.openssl.org
User Support Mailing List                    openssl-users@openssl.org
Automated List Manager                           [EMAIL PROTECTED]

Reply via email to