Ralf Hauser wrote:

> We are trying to build a plugin to prevent phishing. See also 
> http://www.w3.org/2005/Security/usability-ws/papers/08-esecurity-browser-enhancements/
>  
> and https://bugzilla.mozilla.org/show_bug.cgi?id=322661 .

Ralf,  first you asked for the handshake hash values, which differ for
every handshake, and are not the same across multiple handshakes with
the same session keys, never the same in any two handshakes.

Then you asked for the master secret, or a hash thereof.  This would be
constant across multiple handshakes with the same SSL session.  But
SSL sessions are themselves rather short lived things.

The two values you asked for (handshake hashes, session keys) have very
different properties. So, let me ask again: what do you really need?

If what you need is an identifier of an SSL session, the SSL session ID
already exists, is as unique as the session key, is not secret, is
available (that is, there is an accessor function for it) today.
Will this do?  If not, why not?

> Probably, the approaches are best described in 
> http://www.esecurity.ch/OHB06b.pdf .

>>>I see that I can get at the serverCert in
>>>http://xulplanet.com/references/xpcomref/ifaces/nsISSLStatus.html
>>
>>Yes, unlike the other values requested above, the cert is public info,
>>and is typically sent over the wire in the clear.
> 
> So, if the 36 bytes are not available, hashing the session key plus the 
> server certificate most likely identify an SSL session pretty uniquely as a 
> fall-back as well - would you agree?

The SSL session is uniquely identified by the 256-bit session ID.

But given that new sessions (with new session keys and IDs) are established
the first time you visit any SSL server after restarting your client program,
just how do you think any value as unique as the session key is going to
thwart phishing?
_______________________________________________
dev-tech-crypto mailing list
dev-tech-crypto@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-tech-crypto

Reply via email to