It is hard to ignore the recent news about government sponsored
    internet surveillance campaigns, which are alleged to involve
    decrypting SSL traffic. In light of these news, should you do
    anything differently? Does it matter to your network and how? Even
    if today only a small group possesses the knowledge and resources to
    decrypt SSL, chances are that this secret will leak like so many and
    the resources required to apply the techniques will only get cheaper
    and in turn become available to well funded advisories like
    organized crime. The information once decrypted may also be at risk
    from being compromised by anyone who compromised the organization
    that now holds the data. So does it matter?

    First of all, I don't think there is "proof" at this point that SSL
    in itself has been broken. SSL and the encryption algorithms it
    negotiates have seen many implementation issues in the past, and it
    is fair to assume that broken implementations, bad random number
    generators and sub-optimal configurations make breaking "real live"
    SSL a lot easier then it should be based on the strength of the
    underlying algorithms. Additionally, in many high profile attacks,
    SSL wasn't the problem. The end point or the SSL infrastructure was
    compromised instead and as a result, the encryption algorithm didn't
    matter.

  via [1]ISC Diary | SSL is broken. So what?.
    __________________________________________________________________

  My original entry is here: [2]ISC Diary | SSL is broken. So what?. It
  posted Tue, 10 Sep 2013 00:09:12 +0000.
  Filed under: encryption, InfoSec, SSL,

References

  1. https://isc.sans.edu/diary/SSL+is+broken.+So+what%3F/16529
  2. https://www.prjorgensen.com/2013/09/09/isc-diary-ssl-is-broken-so-what/