chud
11-04-2002, 01:54 PM
Disclaimer: The following is an attempt at helping the developers by suggesting a thought that has been bugging me. I am by no means an expert on cryptography or the workings of EQ.
If the client is sending the session key back to the server using the server's public key, then it would seem feasible to break the server's private key. This assumes of course we know the payload well enough.
Once we have the private key it would seem possible to intercept the session keys by remote sniffing outgoing packets instead of local memory sniffing.
Of course if the key pair is changed frequently, the method to break the private key would need to be reasonably fast.
Where is this logic flawed?
Please hold off your responses unless you are confident you know what you are talking about. There are many threads here that you should read first regarding the encryption process.
If the client is sending the session key back to the server using the server's public key, then it would seem feasible to break the server's private key. This assumes of course we know the payload well enough.
Once we have the private key it would seem possible to intercept the session keys by remote sniffing outgoing packets instead of local memory sniffing.
Of course if the key pair is changed frequently, the method to break the private key would need to be reasonably fast.
Where is this logic flawed?
Please hold off your responses unless you are confident you know what you are talking about. There are many threads here that you should read first regarding the encryption process.