Announcement

Collapse
No announcement yet.

SSL - how safe?

Collapse
X
 
  • Filter
  • Time
  • Show
Clear All
new posts

  • SSL - how safe?

    I used TCP spy on a ssl request ever and afaik i seen the url requested.
    Today i do the same and i don't see any url related string.
    Maybe i am wrong about the first time..?

    My main concern was that GET statements having username and password would be readable, even with SSL.
    Today i am not so sure, can't read anything.
    Is SSL safe on this?
    hellobasic

  • #2
    When you use a secure (HTTPS) connection, after the handshake completes, absolutely everything that is exchanged between the client and server is encrypted. That includes the command (GET, POST, HEAD, etc.) and the username/password credentials which are passed to the server as part of the request header block.

    Now, if you look at the raw data stream, what you will probably see is the remote host name amongst a bunch of other "junk" right at the beginning of the connection. This is the server's SSL certificate which is being provided to the client, and the common name (CN) for the ceritificate will be the fully qualified domain name for the host. That said, it's not "secret" information (domain names are public), nor could anything in the certificate be used to expose the system.

    As far as I know, SSL3 and TLS1 sessions (which are by far the most common) have never been compromised as long as a reasonable key length has been used (e.g.: 128 bit or higher). Sites which use 56 bit key encryption can be brute forced, but that's an issue with the key size, not the protocol itself.
    Mike Stefanik
    sockettools.com

    Comment


    • #3
      I must have been mistaken then.
      I seen the whole request with ?params&.. stuff.

      Guess it must have been a left-over from another log.

      I have SSL requests with the password in the url (not ours), so i was a bit afraid.
      hellobasic

      Comment

      Working...
      X