I am wondering what to do if a client requests a second level of encryption over SSL?
For example, I have an SSL tunnel, and the client wants me to use symmetric key encryption for the data passing through this tunnel. The symmetric key is session-based and is sent from the server to the client over the original SSL tunnel.
I don’t understand how much safer it is. If the SSL tunnel is compromised, then theoretically the same symmetric key is sent from the server to perform symmetric encryption during the session.
Can anyone suggest different points of view on this situation? I am sure that if there was a common secret set in advance (for example, a one-time password), this would make things more secure, but since the secret is transmitted through the session via SSL, I do not see how it buys us additional security.
What are your thoughts, and have you had a similar experience?
thanks
source share