[3132] in WWW Security List Archive

home help back first fref pref prev next nref lref last post

PCT and SSL

daemon@ATHENA.MIT.EDU (Jorge Figueiredo)
Wed Oct 2 15:03:22 1996

Date: Wed, 02 Oct 1996 17:23:24 +0000
From: Jorge Figueiredo <jf@porto.ucp.pt>
Reply-To: jf@porto.ucp.pt
To: www-security@ns2.rutgers.edu
Errors-To: owner-www-security@ns2.rutgers.edu

Hello,

I read on the PCT 2.0 Draft (Private Communications Technology)  that 
PCT 1.0 Draft had a description of the differences between PCT and SSL,
so I looked for it and I found the following :

> The PCT protocol differs from SSL chiefly in the design of its
> handshake phase, which differs from SSL's in a number of respects:
> 
> - The round and message structures are considerably shorter and
>   simpler: a reconnected session without client authentication
>   requires only one message in each direction, and no other type of
>   connection requires more than two messages in each direction.
> 
> - Negotiation for the choice of cryptographic algorithms and formats
>   to use in a session has been extended to cover more protocol
>   characteristics and to allow different characteristics to be
>   negotiated independently.  The PCT client and server negotiate, in
>   addition to a cipher type and server certificate type, a hash
>   function type and a key exchange type.  If client authentication is
>   requested, a client certificate type and signature type are also 
>   negotiated.
> 
> - Message authentication has been revamped so that it now uses
>   different keys from the encryption keys.  Thus, message
>   authentication keys may be much longer (and message authentication
>   therefore much more secure) than the encryption keys, which may be
>   weak or even non-existent.  
> 
> - A security hole in SSL's client authentication has been repaired;
>   the PCT client's authentication challenge response now depends on
>   the type of cipher negotiated for the session.  SSL's client
>   authentication is independent of the cipher strength used in the
>   session and also of whether the authentication is being performed
>   for a restarted session or a new one.  As a result, a
>   "man-in-the-middle" attacker who has obtained the session key for
>   a session using weak cryptography, can use this broken session to
>   authenticate as the client in a session using strong cryptography.
>   If, for example, the server normally restricts certain sensitive
>   functions to high-security sessions, then this security hole allows 
>   intruders to circumvent the restriction.
> 
> - A "verify-prelude" field has been added to the handshake phase,
>   with which the client and server can check that the cipher type
>   (and other) negotiations carried out in the clear have not been
>   tampered with.  (SSL version 3 uses a similar mechanism, but its
>   complete version 2 compatibility negates its security function,
>   by allowing adversaries simply to alter version numbers as well
>   as cipher types.)


Are these weaknesses about SSL true for the version 3?

Can you tell me any source were I can find a comparision between PCT and
SSL?

home help back first fref pref prev next nref lref last post