P2P Security issues - Trusting SSL |
Public keys or certificates must be exchanged between Peer 1 (Requesting Peer) and Peer 5 (Trusted Peer). While the protocol header of the P2P packet can and must be read by each peer, the payload part is encrypted with the trusted peer's key and stays encrypted while being routed by middlemen peers.
The privacy of a SSL-through-SSL transmission is moved beneath the application layer, limited to the payload, therefore it is made application independent.
Trusting SSL in a distributed environment
To prevent man-in-the-middle attacks against SSL, the trusted peer's key or certificate itself must be obtained through a channel that ensures authenticity, e.g. it must be downloaded from a secure, certified web site.
If certificates or public keys in a P2P network are not either distributed
through out-of-band methods, or at least signed by a trusted CA, the identity of
the keyholding peer cannot be trusted. It can then at best be used for traffic
encryption against the monitoring efforts of third parties *outside* of the
peer-to-peer network.
Prev Next Index