[13489] in cryptography@c2.net mail archive
Re: Maybe It's Snake Oil All the Way Down
daemon@ATHENA.MIT.EDU (Eric Rescorla)
Fri Jun 6 22:39:24 2003
X-Original-To: cryptography@metzdowd.com
X-Original-To: cryptography@metzdowd.com
To: Tim Dierks <tim@dierks.org>
Cc: Peter Clay <pete@flatline.org.uk>,
Ian Grigg <iang@systemics.com>, cryptography@metzdowd.com
Reply-To: EKR <ekr@rtfm.com>
From: Eric Rescorla <ekr@rtfm.com>
Date: 06 Jun 2003 14:49:37 -0700
In-Reply-To: <6.0.0.9.2.20030606150513.04ac45c0@127.0.0.1>
Tim Dierks <tim@dierks.org> writes:
> At 09:47 PM 6/4/2003, Peter Clay wrote:
> >You can't really hide this info with SSL: because of a number of design
> >decisions, you can only have one SSL site per IP address. The server has
> >to present a certificate - including site name - before the client sends
> >the Host: header indicating which site you want to see. So the
> >eavesdropper can work out what site you're visiting by looking solely at
> >the IP address.
>
> This isn't an SSL flaw; this is an HTTPS flaw, and it is repaired by
> RFC 2817, which is, as far as I know, sadly unimplemented in the field.
Unfortunately, 2817 is totally broken. What you want is the
TLS extensions draft, which is on its way to RFC even as we speak.
-Ekr
--
[Eric Rescorla ekr@rtfm.com]
http://www.rtfm.com/
---------------------------------------------------------------------
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to majordomo@metzdowd.com