[14305] in cryptography@c2.net mail archive

home help back first fref pref prev next nref lref last post

Re: Tinc's response to "Linux's answer to MS-PPTP"

daemon@ATHENA.MIT.EDU (kent@songbird.com)
Sat Sep 27 18:17:59 2003

X-Original-To: cryptography@metzdowd.com
X-Original-To: cryptography@metzdowd.com
From: kent@songbird.com
Date: Sat, 27 Sep 2003 10:08:47 -0700
To: Joseph Ashwood <ashwood@msn.com>
Cc: cryptography@metzdowd.com
Mail-Followup-To: Joseph Ashwood <ashwood@msn.com>,
	cryptography@metzdowd.com
In-Reply-To: <000201c38497$d90d4700$6601a8c0@JOSEPHAS>

On Fri, Sep 26, 2003 at 06:26:16PM -0700, Joseph Ashwood wrote:
> > First, keys for the
> > symmetric cipher encryption are exchanged. Mallet cannot decrypt keys he
> > gets from Bob and Alice, because he doesn't have their private keys.
> But he does, he spoofed each connection and acted as initiator for both,

Presuming that Bob and Alice have previously exchanged correct public
keys, how does he do that?

-- 
Kent Crispin                               "Be good, and you will be
crispin@icann.org,kent@songbird.com         lonesome."
p: +1 310 823 9358  f: +1 310 823 8649               -- Mark Twain

---------------------------------------------------------------------
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to majordomo@metzdowd.com

home help back first fref pref prev next nref lref last post