Time |
S |
Nick |
Message |
06:41 |
|
|
mr_lou joined ##friendlyjava |
06:41 |
|
|
Jantz joined ##friendlyjava |
10:35 |
|
|
kirua joined ##friendlyjava |
12:13 |
|
|
Jantz joined ##friendlyjava |
15:09 |
|
mr_lou |
I've made a small webserver for my BD-J stuff.... any advice on adding SSL to something like that, when trafic will also be via a standard IP address? |
15:27 |
|
aditsu |
mr_lou: you mean like https://(ip address)? |
15:56 |
|
mr_lou |
Yup |
15:57 |
|
aditsu |
https://stackoverflow.com/questions/2043617/is-it-possible-to-have-ssl-certificate-for-ip-address-not-domain-name |
16:03 |
|
mr_lou |
Yes I found that too actually. |
16:04 |
|
mr_lou |
The next problem is that I don't know pre-hand what the IP address will be.... |
16:04 |
|
mr_lou |
I can in theory be anything. |
16:05 |
|
mr_lou |
*It |
16:10 |
|
aditsu |
is it dynamic? |
16:17 |
|
mr_lou |
It's an administration interface for a display system. The IP will depend on the network it's installed in. So it'll always be different. |
16:18 |
|
mr_lou |
I would still like to offer secure trafic though. |
16:18 |
|
mr_lou |
So some sniffer can't just sniff the password. |
16:19 |
|
aditsu |
do you have any control over the client side? |
16:20 |
|
mr_lou |
What do you mean control? My server sends the HTML. That's about it. |
16:20 |
|
aditsu |
that's a no then |
16:22 |
|
aditsu |
well, then it's pretty much like a router, basically all the ones I've worked with come with a self-signed certificate that will give a warning when you connect |
16:22 |
|
aditsu |
or perhaps with a certificate for a domain name that doesn't match the ip |
16:37 |
|
mr_lou |
yea, that's true. It's basically the same as with office hardware too, like printers wiht a web interface. |
16:37 |
|
aditsu |
yeah, same thing |
16:38 |
|
mr_lou |
It is silly though, that users are warned about the certificates though. |
16:39 |
|
aditsu |
well, the issue is the possibility of a MITM attack |
16:40 |
|
aditsu |
https is designed to ensure both encryption and authentication of the server |
16:40 |
|
aditsu |
at the same time |
16:41 |
|
aditsu |
it would be nice if there was an "encryption-only" option for this kind of case |
16:42 |
|
aditsu |
but even without encryption, you can avoid transmitting the plain password |
16:43 |
|
aditsu |
do a salted hash on the client side and send that |
16:44 |
|
|
Jantz joined ##friendlyjava |
17:39 |
|
mr_lou |
aditsu, A salted hash wouldn't prevent someone sniffing the traffic, to simply send the same trafic. |
17:40 |
|
aditsu |
a different salt would be sent by the server every time |
17:41 |
|
mr_lou |
But can't that be sniffed too? |
17:41 |
|
aditsu |
yes, but after the client sends the hash, it's useless |
17:42 |
|
mr_lou |
Yes... I see that's how I have to do it. |
17:42 |
|
mr_lou |
thanks. |
18:58 |
|
|
Jantz_ joined ##friendlyjava |
23:12 |
|
|
Jantz joined ##friendlyjava |