[15909] in cryptography@c2.net mail archive

home help back first fref pref prev next nref lref last post

Re: Any TLS server key compromises?

daemon@ATHENA.MIT.EDU (Sean Smith)
Sat Aug 14 16:10:00 2004

X-Original-To: cryptography@metzdowd.com
X-Original-To: cryptography@metzdowd.com
In-Reply-To: <411BD441.1050801@rsasecurity.com>
Cc: cryptography@metzdowd.com
From: "Sean Smith" <sws@cs.dartmouth.edu>
Date: Fri, 13 Aug 2004 18:33:02 -0400
To: Marc Branchaud <marcnarc@rsasecurity.com>

> has a TLS server (or client, for that matter) key ever actually been 
> compromised?


Hi, Marc!

I don't know about in-the-wild attacks.

However, proof-of-concept attacks:

Server-side: Brumley and Boneh did timing attacks on Apache SSL 
servers---see their Usenix Security paper from 2003.

Client-side: we've done a number of host-based attacks and http-based 
attacks, to steal or borrow use of a user's client-side SSL/TLS key.  
See:

  J. Marchesini, S.W. Smith, M.Zhao.
"Keyjacking: The Surprising Insecurity of Client-side SSL"
Computers and Security.  To appear, 2004.
http://www.cs.dartmouth.edu/~sws/abstracts/msz04.shtml


--Sean

Sean W. Smith sws@cs.dartmouth.edu  www.cs.dartmouth.edu/~sws/
  Asst Prof, Department of Computer Science, Dartmouth College.
  Director, Cybersecurity and Trust Research Center, Institute for 
Security Technology Studies.

---------------------------------------------------------------------
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to majordomo@metzdowd.com

home help back first fref pref prev next nref lref last post