"RayLopez99" <raylopez88@gmail.com> wrote in message
news:10194b0e-7873-4931-b5ec-d8d7d99f939d@y23g2000yqd.googlegroups.com...
On Nov 1, 4:13 pm, "FromTheRafters" <erra...@nomail.afraid.org> wrote:
>
> >> Does this make sense?
>
> > No. Private keys are never shared with anyone.
>
> > Further reading:
> >http://www.ourshop.com/resources/ssl.html
>
> It may take a while, but eventually he will understand that the data
> is
> "covered" only in transit just as with TPM supported disk encryption
> it
> is only covered at rest.
Explain please in simple words. You are saying encryption of https
data is only done in transit? Why/how? To be more explicit: C
(client) --> S (intermediary) --> Z (endpoint/host server): you are
saying encryption is only at the "-->" in between the points, C, S and
Z? That is, at the servers C,S,Z you can read the data packets in
plaintext, but when they transmit the data stream they become
encrypted ciphertext?
***
The client and server have a trust relationship, they agree on a keyset
and the data is encrypted by the client, sent out on the wire, received
by the server, and decrypted by the key. If it needs to do it again (not
the final destination), another trust relationship is set up btween the
server and the next step and the process may be repeated (new
relationships, new keys, no transitive trust). The idea was to have the
data covered so that sniffing or otherwise capturing packets enroute
would not have value to the interloper (the encryption security is as
good as the key management - if the interloper (you don't have a trust
relationship with) doesn't have the key, he cannot convert the
ciphertext to plaintext.
You are *trusting* all of the SSL capable servers with your data unless
you "cover" your data for the entire source to destination trip.
***
If so, this does make Jason Keats explanation work, but I would be
very surprised if this is so. Why would anybody design an algorithm
that decrypts as soon as it reaches a server?
***
Those whom are only concerned with the security (integrity) of the
point-to-point communications.
Think of the old can-to-can voice communication, and someone
eavesdropping with a tap on the string. You still want to be able to
speak into one end and hear from the other, but you want the
eavesdropper to get nothing intelligible. If your can-to-can connection
is only one part of a relay communication network, you wouldn't be
concerned about the relay personnel actually having access to that
information uncovered. If you were concerned about that, then end-to-end
coverage is what you really want.
***
Bookmarks