[56819] in North American Network Operators' Group

home help back first fref pref prev next nref lref last post

Re: OpenSSL

daemon@ATHENA.MIT.EDU (Michael.Dillon@radianz.com)
Tue Mar 18 05:24:20 2003

To: nanog@merit.edu
From: Michael.Dillon@radianz.com
Date: Tue, 18 Mar 2003 10:23:31 +0000
Errors-To: owner-nanog-outgoing@merit.edu


> This is a new attack, not the one Schneier was talking about.  It's 
> very elegant work -- they actually implemented an attack that can 
> recover the long-term private key.  The only caveat is that their 
> attack currently works on LANs, not WANs, because they need more 
> precise timing than is generally feasible over the Internet.

Hmmm...
This means that it is safer for senior managers in a company to 
communicate using private ADSL Internet connections to their desktops 
rather than using a corporate LAN.

Very interesting. Could IP Centrex be the wave of the future? Will ISPs 
offer random jitter insertion guarantees on such a service to foil people 
using timing attacks?

--Michael Dillon




home help back first fref pref prev next nref lref last post