TE
科技回声
首页24小时热榜最新最佳问答展示工作
GitHubTwitter
首页

科技回声

基于 Next.js 构建的科技新闻平台,提供全球科技新闻和讨论内容。

GitHubTwitter

首页

首页最新最佳问答展示工作

资源链接

HackerNews API原版 HackerNewsNext.js

© 2025 科技回声. 版权所有。

Five researchers deal SSL/TLS a biggish blow

69 点作者 danielhunt大约 12 年前

8 条评论

rem1313大约 12 年前
Although sensationalist title, always good to remember that attacks only get better - some angle might show up that changes this to be practical in some special circumstance. The takeaway here is to plan moving away from RC4 and there is still time to do this in orderly fashion
ck2大约 12 年前
We can stop using RC4<p><a href="http://dl.dropbox.com/u/24257718/cipher_chart.png" rel="nofollow">http://dl.dropbox.com/u/24257718/cipher_chart.png</a><p>Virtually all server side hardware can do AES-NI instructions in hardware now (unless you are using ATOM cpu for ssl connections?) and most non-mobile hardware clients can do AESNI too for AES-128
评论 #5389538 未加载
评论 #5389519 未加载
评论 #5389588 未加载
darklajid大约 12 年前
Same thing as [1] (4 days ago), for all I can tell?<p>1: <a href="https://news.ycombinator.com/item?id=5364807" rel="nofollow">https://news.ycombinator.com/item?id=5364807</a>
评论 #5389566 未加载
gingerlime大约 12 年前
I've also tried to post a couple of links discussing these attacks in practice, and comparing the risks from BEAST/Lucky 13 to these...<p>* <a href="https://news.ycombinator.com/item?id=5367805" rel="nofollow">https://news.ycombinator.com/item?id=5367805</a> - links to a very interesting answer on security stackexchange that puts things into pretty good perspective.<p>* <a href="https://news.ycombinator.com/item?id=5368610" rel="nofollow">https://news.ycombinator.com/item?id=5368610</a> - links to an interesting possible browser workaround to these attacks.<p>(disclaimer: I'm the one who posted both the questions on security stackexchange and HN posts. I'm not trying to be a karma whore, just hoping to get some discussion going on around those... both went under the radar)
评论 #5389700 未加载
powertower大约 12 年前
Does not seem like a big deal to me; because it's unlikely to work outside a lab environment, nor passed the first 256 bytes (without a truly massive amount of connections at least).<p>And all that work for what - to sniff out your own cookie?<p>I mean, what is this good for, it's not a man-in-the-middle attack, it's not a spoofing attack, etc?<p>*Though it's really good work on the researchers part, and the author of the article explained it all in an excellent way.
评论 #5389546 未加载
btian大约 12 年前
Link bait title. It doesn't work in general as reported in the article.
评论 #5389675 未加载
评论 #5389232 未加载
serialx大约 12 年前
Interesting.. It has more practical application to IMAP or POP3.<p><a href="http://crypto.stackexchange.com/questions/3451/is-rc4-a-problem-for-password-based-authentication" rel="nofollow">http://crypto.stackexchange.com/questions/3451/is-rc4-a-prob...</a>
评论 #5389563 未加载
denibee大约 12 年前
But doesn't this attack only reveal the second byte of the RC4 cipher? If I got it right it is some kind of frequency analysis that doesn't reveal the entire key (cipher), or at least with high probability (higher than 1)..