> No. Without a previously arranged shared secret and no trusted introducer, > authentication is *impossible*. Authentication is an act of recognizing > a party that posesses something you can verify. You CAN NOT generate > authentication secrets on the fly.
> Viktor. Or, to put it in simple terms, to ensure that you are talking to the correct party, there must be some definition of "correct party" that is testable or verifiable. It requires in principle that the correct party have something or be able to do something that no MITM has or can do. Otherwise, MITM rejection is impossible in principle. There must be some difference between the MITM and the intended endpoint. (This is not quite literally true, as interlock provides another way to do something sort of like MITM rejection. But for practical purposes, it's correct. If the idea is that MITM rejection must actually complete at some point and allow normal communication to progress afterwards, there is no other way known.) DS ______________________________________________________________________ OpenSSL Project http://www.openssl.org User Support Mailing List openssl-users@openssl.org Automated List Manager majord...@openssl.org