Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

Yes you are wrong :D If NSA is not actively man-in-the-middling you, Perfect forward secrecy still works.

ECDHE has been in Openssl since version 1.0.0 so its out there just not used.

Btw. Is there any addon for Firefox that shows the “encrypted communication” details like google does?



> Yes you are wrong :D If NSA is not actively man-in-the-middling you, Perfect forward secrecy still works.

OK, I guess I was reading too much into the (not very enlightening) definition of PFS on Wikipedia and too little of the actual implementation based on Diffie-Hellman, which has the desired properties.

The question that arises is: how feasible is a MITM attack on this phase of session initiation? Can it be kept undetected?


With channel id, it would need to share the state even as laptops move across networks.


They don't have to take an active role though if they just sniff all the traffic, right?


Yes, they do.


Whoops. This wouldn't be the first time I got public/private key schemes muddled in my head.


They won't have access to the temporary keypair that the server generates, and which lives only on the server.




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: