That's correct - that's why IBM is buying Bluecoat. SSL is nothing to a Bluecoat. Child's play :)
-----Original Message----- From: Rich Salz [mailto:[EMAIL PROTECTED] Sent: Tuesday, May 17, 2005 1:23 PM To: Miles Bradford Cc: 'openssl-users@openssl.org' Subject: Re: simple question again > Yes - you are correct...if that entity that does the interception is able to > handle that key without corrupting it - and gets in to the objective server > before the real sender establishes a connection. Capture the key and use it at another time. > This kind of phishing and > interception is not fast enough to do the interception, make contact and > establish a legitimate connection all at once. Sure it is. I just need to buy a computer that's either a little faster than yours or just has less load than yours does. /r$ -- Rich Salz, Chief Security Architect DataPower Technology http://www.datapower.com XS40 XML Security Gateway http://www.datapower.com/products/xs40.html ______________________________________________________________________ OpenSSL Project http://www.openssl.org User Support Mailing List openssl-users@openssl.org Automated List Manager [EMAIL PROTECTED]