>       I still don't understand where you're disagreeing with me.

Your attack includes things like hijacking and redirection, which is not
part of an MITM attack.  Your postings also seem to come down on both
sides of "succesful" as to whether or not that is part of MITM.

If the MITM isn't intercepting or modifying the traffic *between A and B*
it is not MITM.  If A and B -- the participants that originally intended
to communicate -- don't end up having (compromised) communication, than it
is not MITM.

If there's "out of band" signalling that the A:B comm channel has been
attacked, than the protocol is *not* protected against MITM.  Or, you must
include the OOB information as part of the protocol. :)

        /r$

PS:  35 web sites either got the definition wrong, or weren't clear enough
for you to understand?  I'm not swayed.
 --
Rich Salz                  Chief Security Architect
DataPower Technology       http://www.datapower.com
XS40 XML Security Gateway  http://www.datapower.com/products/xs40.html
XML Security Overview      http://www.datapower.com/xmldev/xmlsecurity.html

______________________________________________________________________
OpenSSL Project                                 http://www.openssl.org
User Support Mailing List                    [EMAIL PROTECTED]
Automated List Manager                           [EMAIL PROTECTED]

Reply via email to