> I still don't understand where you're disagreeing with me.
Your attack includes things like hijacking and redirection, which is not
part of an MITM attack. Your postings also seem to come down on both
sides of "succesful" as to whether or not that is part of MITM.
If the MITM isn't intercepting or modifying the traffic *between A and B*
it is not MITM. If A and B -- the participants that originally intended
to communicate -- don't end up having (compromised) communication, than it
is not MITM.
If there's "out of band" signalling that the A:B comm channel has been
attacked, than the protocol is *not* protected against MITM. Or, you must
include the OOB information as part of the protocol. :)
/r$
PS: 35 web sites either got the definition wrong, or weren't clear enough
for you to understand? I'm not swayed.
--
Rich Salz Chief Security Architect
DataPower Technology http://www.datapower.com
XS40 XML Security Gateway http://www.datapower.com/products/xs40.html
XML Security Overview http://www.datapower.com/xmldev/xmlsecurity.html
______________________________________________________________________
OpenSSL Project http://www.openssl.org
User Support Mailing List [EMAIL PROTECTED]
Automated List Manager [EMAIL PROTECTED]