[14305] in cryptography@c2.net mail archive
Re: Tinc's response to "Linux's answer to MS-PPTP"
daemon@ATHENA.MIT.EDU (kent@songbird.com)
Sat Sep 27 18:17:59 2003
X-Original-To: cryptography@metzdowd.com
X-Original-To: cryptography@metzdowd.com
From: kent@songbird.com
Date: Sat, 27 Sep 2003 10:08:47 -0700
To: Joseph Ashwood <ashwood@msn.com>
Cc: cryptography@metzdowd.com
Mail-Followup-To: Joseph Ashwood <ashwood@msn.com>,
cryptography@metzdowd.com
In-Reply-To: <000201c38497$d90d4700$6601a8c0@JOSEPHAS>
On Fri, Sep 26, 2003 at 06:26:16PM -0700, Joseph Ashwood wrote:
> > First, keys for the
> > symmetric cipher encryption are exchanged. Mallet cannot decrypt keys he
> > gets from Bob and Alice, because he doesn't have their private keys.
> But he does, he spoofed each connection and acted as initiator for both,
Presuming that Bob and Alice have previously exchanged correct public
keys, how does he do that?
--
Kent Crispin "Be good, and you will be
crispin@icann.org,kent@songbird.com lonesome."
p: +1 310 823 9358 f: +1 310 823 8649 -- Mark Twain
---------------------------------------------------------------------
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to majordomo@metzdowd.com