[56821] in North American Network Operators' Group

home help back first fref pref prev next nref lref last post

Re: OpenSSL

daemon@ATHENA.MIT.EDU (alex@yuriev.com)
Tue Mar 18 10:03:33 2003

Date: Tue, 18 Mar 2003 10:03:41 -0500 (EST)
From: alex@yuriev.com
To: nanog@merit.edu
In-Reply-To: <kjd6koahbx.fsf@romeo.rtfm.com>
Errors-To: owner-nanog-outgoing@merit.edu


> > This means that it is safer for senior managers in a company to 
> > communicate using private ADSL Internet connections to their desktops 
> > rather than using a corporate LAN.
>
> Afraid not. The timing attack is an attack on the SSL server. 
> So as long as the SSL server is accessible at all, the attack
> can be mounted. And once the private key is recovered, then
> you no longer need LAN access.

While the timing attack is the attack against the SSL server, it is my
reading of the paper that the attacks' success largely depends on ability to
tightly control the time it takes to communicate with a service using SSL.
Currently, such control is rather difficult to achive on links other than
ethernet.

Alex


home help back first fref pref prev next nref lref last post