Thats cool..they do have DH ...a quick look suggested a premaster
secret(randomly choosen). Dint seem like theres a DH exchange

Sudharsan

Sudharsan

On 5/25/06, Victor Duchovni <[EMAIL PROTECTED]> wrote:
On Fri, May 26, 2006 at 07:23:05AM +0530, Sreeram Kandallu wrote:

> Hi All
>
> Is it possible to decrypt a recorded SSL session, if the attacker gains
> access to the RSA private keys at a later point in time? If yes, what
> would be the best way to avoid this?

   $ ciphers='kEDH:!aNULL:!LOW:!EXPORT:@STRENGTH'
   $ openssl -v $ciphers
   DHE-RSA-AES256-SHA      SSLv3 Kx=DH       Au=RSA  Enc=AES(256)  Mac=SHA1
   DHE-DSS-AES256-SHA      SSLv3 Kx=DH       Au=DSS  Enc=AES(256)  Mac=SHA1
   EDH-RSA-DES-CBC3-SHA    SSLv3 Kx=DH       Au=RSA  Enc=3DES(168) Mac=SHA1
   EDH-DSS-DES-CBC3-SHA    SSLv3 Kx=DH       Au=DSS  Enc=3DES(168) Mac=SHA1
   DHE-RSA-AES128-SHA      SSLv3 Kx=DH       Au=RSA  Enc=AES(128)  Mac=SHA1
   DHE-DSS-AES128-SHA      SSLv3 Kx=DH       Au=DSS  Enc=AES(128)  Mac=SHA1
   DHE-DSS-RC4-SHA         SSLv3 Kx=DH       Au=DSS  Enc=RC4(128)  Mac=SHA1

For all these ciphers the attacker has to brute force the symmetric key,
or brute force the DH exchange. Recovery of the RSA or DSS key does not
yield the session key. As DSS certificates are rare in practice, in practice
you get one of:

   $ ciphers='kEDH+aRSA:!aNULL:!LOW:!EXPORT:@STRENGTH'
   $ openssl ciphers -v "$ciphers"
   DHE-RSA-AES256-SHA      SSLv3 Kx=DH       Au=RSA  Enc=AES(256)  Mac=SHA1
   EDH-RSA-DES-CBC3-SHA    SSLv3 Kx=DH       Au=RSA  Enc=3DES(168) Mac=SHA1
   DHE-RSA-AES128-SHA      SSLv3 Kx=DH       Au=RSA  Enc=AES(128)  Mac=SHA1

These ciphers require SSLv3 or TLSv1.

--
       Viktor.
______________________________________________________________________
OpenSSL Project                                 http://www.openssl.org
User Support Mailing List                    openssl-users@openssl.org
Automated List Manager                           [EMAIL PROTECTED]

______________________________________________________________________
OpenSSL Project                                 http://www.openssl.org
User Support Mailing List                    openssl-users@openssl.org
Automated List Manager                           [EMAIL PROTECTED]

Reply via email to