Michael S. Zick wrote:

Two things that occur to me -
*) Doesn't Diffie-Hillman already do that? Without the file exchange.

*) Have you considered this plan from the viewpoint of a zero-knowledge proof?

Mike

thanks for the reference. i had no prior knowledge to Diffie-Hillman. looked it up in wikipedia. And, that's exactly it - anonymous profile-matched 2-way secret encryption on a zero-knowledge platform is exactly what i'm searching for. Essentially, users have to be able to set this up on their computer without doing anything different than they normally do when they log into facebook. Ideally.

Any other thoughts on how to skin this cat? Thanks

On Fri November 28 2008, Peter Sysko wrote:


I've read over the majority of the information about what the OpenSSL project is for and is striving to become, and, being not a hardcore coder, I must say I a little overwhelmed with some technical details that I won't be addressing right now, this post is just to introduce an idea, if it hasn't been presented. Maybe a discussion about this idea could help me and other website owners come to a solution that makes a new type of Dynamic 2-Way SSL "protocol"

Firstly, I'd like to address the need for and the merits of such a protocol, and what it would consist of. Then perhaps a discussion could be informed, if there is a quorum of users who would agree that its a good idea to come about possible implementation methods. Finally, how to make these implementation methods accepted as a solution for todays and tomorrows secure network administration. And also, I dont want to be wasting anyone's time including my own, so if anyone is aware of "out-of-the-box" solutions that already exist, I'll be all ears.

So, heres the problem (as i see the problem, and any thoughts on why this might not be a problem afterall would be appreciated)::

The standard practice is to generate static certificate pairs, usually valid for about a year. The authority of the certificates' authority ranges from self-signed to highly visible EV signatures (that cost a lot of money), based on who you have to validate the "working order" of your cryptographic setup. As a website owner, you can feel comfortable that you are creating a secure "tunnel" from the client to the server. The problems of sending data to an unidentified peer or client (who may be using a proxy), is that THEY don't have a public key with their own private key with a certificate authority vouching for their own node in the network.

(for the sake of the conversation, assume that we are the server admin team for a huge company with millions of peers using their network and have a virtually unlimited needs based budget to secure the network, adn that these millions of peers would download a program to make their network experience secure too)

So, here is my crazy idea:

So we have our EV cert verified and validated on the server. We know that everyone using https to access our domain on port 443 is sending data in a very secure manner. Then, a client wishes to access sensitive data from our server, we go through the following process, in an mostly-automated manner:

• client requests a secure connection to the server (hello server, im on port 443 of your web application) • server responds: "please authenticate yourself, here is an open safe. put your login credentials in this safe and shut the door. Only I can open the safe." • client thus provides login credentials - encrypted in only a way the server can decrypt. • server opens the safe, validates that the user exists. I have new important messages for you from the network, they are secure. do you have a public key? if so, send me the public key to your safe.
• client responds "no, i'm relatively new to the network"
• sever says "thats ok, let me put a tool on your computer that will generate a combination that only your computer will know, so that everyone can send you sensitive data. do you accept?"
• client responds "yes"
• sever sends a package file, a toolkit that using the RSA/SSL Library to generate a pair and a certificate signing request, which goes to us to sign it. "first let me send you something to test the certificate" server sends a randomly generated string encrypted with the public key that the client just provided. "can you read this? what does it say?" • client decrypts with his own new private key using the toolkit, still running. "it says _______" • server "great! thats exactly what i sent to you. We have stored your public key in our keystore, and matched it to your account. now keep your application running when you use our network, in order to ensure you receive data from us in the same secure manner that we send it to you" • client then proceeds to their account page where they can start using features. all data sent to the client during the session will be sent encrypted via the certificate

---

Ok, so thats basically how I see 2-way SSL working. I personified the code and communication between client and server -- of course thats what the application needs to do, so that all the user has to do is 1) Login 2) download a package 3) install and run the package and 4) keep it running along with the web portal the are accessing on port 443

This "toolkit" package could be a Firefox or Opera plugin, to start. or a standalone app that runs concurrently with their favorite browser, or both. the application would have to be able to communicate between the browser, sort of like the TOR module "Vidalia" does. the app/plugin set could be toggled off and on for speed related issues.

This sounds like a large project to me. Could be an awesome evolution of secure networks of the future does anyone else see a merit in it? Any solutions like this exist for 2-way open source SSL? Any feedback is welcomed.

Thanks for reading.

Peter Sysko, CEO
U4EA Networks, Inc.




______________________________________________________________________
OpenSSL Project                                 http://www.openssl.org
User Support Mailing List                    openssl-users@openssl.org
Automated List Manager                           [EMAIL PROTECTED]


--


 \|/
-ª§ª-   U4EA Networks, Inc.
 /|\       http://u4ea.net
---------------------------
Utilities For Every American

______________________________________________________________________
OpenSSL Project                                 http://www.openssl.org
User Support Mailing List                    openssl-users@openssl.org
Automated List Manager                           [EMAIL PROTECTED]

Reply via email to