TE
TechEcho
Home24h TopNewestBestAskShowJobs
GitHubTwitter
Home

TechEcho

A tech news platform built with Next.js, providing global tech news and discussions.

GitHubTwitter

Home

HomeNewestBestAskShowJobs

Resources

HackerNews APIOriginal HackerNewsNext.js

© 2025 TechEcho. All rights reserved.

Practical attack against TLS/SSL and RC4

111 pointsby tomvangoethemalmost 10 years ago

6 comments

apialmost 10 years ago
It's fairly likely that rumors of the NSA's ability to 'decrypt SSL' refers to RC4 vulnerabilities.
评论 #9894623 未加载
theandrewbaileyalmost 10 years ago
While I agree that RC4 should die in a fire, this attack seems impractical to me.<p>&gt; To successfully decrypt a 16-character cookie with a success probability of 94%, roughly 9x2^27 encryptions of the cookie need to be captured. Since we can make the client transmit 4450 requests per seconds, this amount can be collected in merely 75 hours.<p>How likely would that amount of network traffic and energy consumption cue the potential victim that something malicious is going on?
评论 #9892625 未加载
评论 #9892508 未加载
评论 #9892536 未加载
评论 #9892986 未加载
评论 #9892562 未加载
评论 #9893545 未加载
评论 #9893329 未加载
vishwajeetvalmost 10 years ago
As Roy T. Fieldings once said in his research paper, &quot;Cookie-based applications on the Web will never be reliable!&quot; <a href="https:&#x2F;&#x2F;www.ics.uci.edu&#x2F;~fielding&#x2F;pubs&#x2F;dissertation&#x2F;evaluation.htm" rel="nofollow">https:&#x2F;&#x2F;www.ics.uci.edu&#x2F;~fielding&#x2F;pubs&#x2F;dissertation&#x2F;evaluati...</a> Section 6.3.4.2
schmichaelalmost 10 years ago
Does anyone else find it ironic that not only is this link HTTP, but HTTPS is broken for this domain?<p><a href="https:&#x2F;&#x2F;www.rc4nomore.com&#x2F;" rel="nofollow">https:&#x2F;&#x2F;www.rc4nomore.com&#x2F;</a><p>Hopefully the NSA MITMs it with an &quot;RC4 is fffiiinnneee&quot; message.
评论 #9892819 未加载
评论 #9894477 未加载
cypharalmost 10 years ago
I feel &quot;practical&quot; is too strong of a word here. It&#x27;s probably a <i></i>more<i></i> practical attack than previous attacks, but that doesn&#x27;t make it practical by a long stretch.<p>&quot;Only&quot; 75 hours, where you have to force the victim to do make a very large number of encrypted messages. IMO, this wouldn&#x27;t work when trying to break someone&#x27;s SSL connection at the local Starbucks.
评论 #9893789 未加载
评论 #9894324 未加载
评论 #9893599 未加载
userbinatoralmost 10 years ago
The keys they used were only 128 bits, whereas RC4 actually supports up to 2048 bits. I wonder how much that affects their results. (AFAIK the 128 bits is an export restriction thing, upgraded from the previous trivially-breakable 40 bits.)<p>Also, 16 characters seems awfully short for a cookie, especially one meant for authentication purposes.
评论 #9895114 未加载
评论 #9895231 未加载