[openssl-dev] [openssl.org #3744] Enhancement Request

Short, Todd tshort at akamai.com
Wed Mar 11 13:32:46 UTC 2015


This is more of a request to change the TLS protocol, than an enhancement to OpenSSL.

DHE and ECDHE ciphers provide PFS to protect against compromised public key-pairs.

However, if a MITM has the same certificate, signed by a trusted certificate authority, then most bets are off.

Client-authentication can provide additional protection against MITM attacks, and allow servers to identify if a MITM is interfering with a valid user.
--
-Todd Short
// tshort at akamai.com<mailto:tshort at akamai.com>
// “One if by land, two if by sea, three if by the Internet."

On Mar 11, 2015, at 8:28 AM, Shawn Fernandes via RT <rt at openssl.org<mailto:rt at openssl.org>> wrote:

Hi,
At the moment, we have SSL handshake making use of a single certificate, using a single key-pair present in the certificate.
In the event the MITM has the same certificate(SSL - offloader) then the data can be encrypted/decrypted.
Would like to know if we can have the enhancement of using random key pair, generated form each certificate, so that each SSL handshake would make use of a random key-pair, and thereby give a different key value to each encryption -decryption, and therby be able to determine if the MITM with a same certificate has decrypted & encrypted data.
With Regards,
Shawn

_______________________________________________
openssl-dev mailing list
To unsubscribe: https://urldefense.proofpoint.com/v2/url?u=https-3A__mta.openssl.org_mailman_listinfo_openssl-2Ddev&d=AwICAg&c=96ZbZZcaMF4w0F4jpN6LZg&r=QBEcQsqoUDdk1Q26CzlzNPPUkKYWIh1LYsiHAwmtRik&m=ds4i2k1LUtsCfZgPMHS2VdrUvh5w6_xSLfNdm1vpRPo&s=kEns4AYdLMO2_ASqWmVdf9jEzb8yMzvELxKIbzr6Mqc&e=

-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://mta.openssl.org/pipermail/openssl-dev/attachments/20150311/48693838/attachment.html>


More information about the openssl-dev mailing list