TE
科技回声
首页24小时热榜最新最佳问答展示工作
GitHubTwitter
首页

科技回声

基于 Next.js 构建的科技新闻平台,提供全球科技新闻和讨论内容。

GitHubTwitter

首页

首页最新最佳问答展示工作

资源链接

HackerNews API原版 HackerNewsNext.js

© 2025 科技回声. 版权所有。

Tcpcrypt

92 点作者 rnicholson将近 15 年前

11 条评论

thorax将近 15 年前
I really like when people acknowledge the difference between passive and active attackers. I really, really want there to be more passive protection by default without requiring every computer/node/server to have a trusted certificate.<p>I really would like to see a better handling for this in the case of https as well. I want a way to see a mechanism that a site can offer to provide passive communication protection but where the site does not guarantee its identity, thus meaning it's possible for a MitM attack if you're willing to accept that risk.
评论 #1609708 未加载
评论 #1609683 未加载
tptacek将近 15 年前
This is basically useless as-is for things like banking security, because the security of SSL is premised on inherent resistence to "active" (MITM) attackers.
评论 #1609538 未加载
ycweb将近 15 年前
A lot of the SSL vs. SSH discussion on here is just demonstrating the fact that there is no one-size-fits-all solution for authentication.<p>The point of tcpcrypt is to get the best security possible under any setting, so it can be used with both SSL- and SSH-like settings. See slide 5 of the talk on the web site:<p><a href="http://tcpcrypt.org/tcpcrypt-slides.pdf" rel="nofollow">http://tcpcrypt.org/tcpcrypt-slides.pdf</a><p>One thing I haven't seen discussed yet is that fact that come October, the EKE patent is going to expire, which means that all of a sudden it's going to be legal to do strong authentication using only human-chosen passwords. Strong password authentication is desperately needed, because people overwhelmingly both chose week passwords and don't think carefully about where they send those passwords.<p>Somewhat independent of tcpcrypt, section 4.3 of the tcpcrypt Usenix paper suggests a nice and simple secure password-authentication protocol. Deploying such a protocol would make a huge difference, except... what are you authenticating? You can prove possession of a password, but this doesn't actually protect you unless the authentication is tied to session traffic, and you are authenticating communication endpoints. SSL, IPSec, and even SSH don't provide adequate hooks for doing this (though SSH would be easier to retrofit than the other two). Tcpcrypt does.<p>So the way to view this is that in the absence of authentication, tcpcrypt will be vulnerable to MITM. But as soon as you go to authenticate yourself to a server (by typing a password or verifying a certificate), the authentication will fail, and the MITM will no longer be able to deceive the user.
yason将近 15 年前
There's not much point in encryption unless you know who you're talking with.
评论 #1613014 未加载
thwarted将近 15 年前
Sounds like the ubiquitous opportunistic encryption that was a goal of FreeS/WAN.<p><a href="http://www.freeswan.org/" rel="nofollow">http://www.freeswan.org/</a> <i>2004/03/01</i><p><i>FreeS/WAN is no longer in active development. Although we've created a solid IPsec implentation widely used to construct Virtual Private Networks, the project's major goal, ubiquitous Opportunistic Encryption, is unlikely to be reached given its current level of community support.</i>
评论 #1610163 未加载
X-Istence将近 15 年前
I can't find this anywhere, and I looked in the source code as well, what is the license for this?<p>The Linux kernel module is GPL, however there is no license on the rest of the source code. I have no idea if I can use any part of this and port it over to FreeBSD as a kernel module for example.
评论 #1610289 未加载
drdaeman将近 15 年前
Why reinvent the wheel when we already have IPsec?
评论 #1609356 未加载
评论 #1609523 未加载
评论 #1609790 未加载
评论 #1615022 未加载
评论 #1609362 未加载
peterwwillis将近 15 年前
i really don't like any aspect of this at all. so, my encryption is not guartanteed, i don't know if it's working, it doesn't cover all network traffic, and isn't shipped by default with any operating systems. i'm never going to use this and i'm never going to recommend it to anyone for any purpose. (sorry, i drank a jug of haterade this morning)
评论 #1609577 未加载
评论 #1609833 未加载
sweis将近 15 年前
The performance comparison to SSL is not really fair, since tcpcrypt does not offer security against passive attackers.
评论 #1612024 未加载
caf将近 15 年前
How serious can they be about ubiquitous encryption, if they can't even be bothered enabling HTTPS on their site?
nik61将近 15 年前
They don't look very trustworthy to me.