On Tuesday 25 October 2011, Jason Grout wrote:
> On 10/25/11 10:40 AM, Martin Albrecht wrote:
> > Jason asked me off list to jump in because I work in crypto. Btw. I am
> > actually don't work in network security so I am not really an expert on
> > the matter. But for what it's worth, I have never heard of the protocol.
> > 
> > I took a quick look at the website and there are serious people behind
> > the tcpcrypt (on the "about us" website).
> > 
> > However, from the website it seems, tcpcrypt doesn't guarantee privacy in
> > the default setting except against passive attackers, i.e. those which
> > can only listen but not control traffic on the network. But if there is
> > a shared secret such as a password, it can optionally use
> > authentication.
> 
> Thanks for weighing in.  I was thinking of your SSL vulnerability paper
> [1] when I thought of your name connected with current network security
> protocols.

SSH :)

> I'll file tcpcrypt in my "interesting; let's see where it goes" list.

I asked a colleague and it seems the general consensus seems to be that the 
design is solid. They also had a USENIX paper, which would also imply a 
certain quality. However, you'll have to decide whether the "opportunistic 
encryption" is sufficient for you or check how hard it is to integrate it into 
the authentication mechanisms already in place.

Cheers,
Martin

--
name: Martin Albrecht
_pgp: http://pgp.mit.edu:11371/pks/lookup?op=get&search=0x8EF0DC99
_otr: 47F43D1A 5D68C36F 468BAEBA 640E8856 D7951CCF
_www: http://martinralbrecht.wordpress.com/
_jab: martinralbre...@jabber.ccc.de

-- 
To post to this group, send an email to sage-devel@googlegroups.com
To unsubscribe from this group, send an email to 
sage-devel+unsubscr...@googlegroups.com
For more options, visit this group at http://groups.google.com/group/sage-devel
URL: http://www.sagemath.org

Reply via email to