On Mar 10, 2010, at 11:59, Olivier Nicole
wrote:
Now Diffie-Hellman may help providing the trust for the fingerprint.
No it won't. Trust goes either via a trusted third party as in PKI or
the pgp chain of trust or via direct verification. In the latter case
if you cannot establish tr
Hi,
> > The pre-shared information need not to be secret ... but there is
> > need for pre-shared trusted information.
> Er, if the pre-shared information is not secret, how can I be sure
> that the person presenting it is in fact my intended correspondent
> and not a MIM?
That is why I wrote "tr
On 10/03/10 07:16, per...@pluto.rain.com wrote:
but logic tends to tell me that is I have no prior knowledge about
the person I am about to talk to, anybody (MIM) could pretend to
be that person.
True. Cryptography by it self does not solve the identity problem.
The pre-shared information ne
Olivier Nicole wrote:
> > What happened to Diffie-Hellman? Last I heard, its whole
> > point was to enable secure communication, protected from both
> > eavesdropping and MIM attacks, between systems having no prior
> > trust relationship (e.g. any sort of pre-shared secret) ...
>
> I am not expe
On Tue, Mar 9, 2010 at 12:48 AM, Olivier Nicole wrote:
> > What happened to Diffie-Hellman? Last I heard, its whole point was
> > to enable secure communication, protected from both eavesdropping
> > and MIM attacks, between systems having no prior trust relationship
> > (e.g. any sort of pre-sh
> What happened to Diffie-Hellman? Last I heard, its whole point was
> to enable secure communication, protected from both eavesdropping
> and MIM attacks, between systems having no prior trust relationship
> (e.g. any sort of pre-shared secret). What stops the server and
> client from establishi
Angelin Lalev wrote:
> So, SSH uses algorithms like ssh-dss or ssh-rsa to do key exchange.
> These algorithms can defeat any attempts on eavesdropping, but cannot
> defeat man-in-the-middle attacks. To defeat them, some pre-shared
> information is needed - key fingerprint.
What happened to Diffi
On Sun, Mar 7, 2010 at 3:25 PM, Angelin Lalev wrote:
> Greetings,
>
> I'm doing some research into ssh and its underlying cryptographic
> methods and I have questions. I don't know whom else to ask and humbly
> ask for forgiveness if I'm way OT.
>
> So, SSH uses algorithms like ssh-dss or ssh-rsa
Angelin Lalev writes:
;2~> On Sun, Mar 7, 2010 at 11:25 PM, Angelin Lalev
wrote:
>> Greetings,
>>
>> I'm doing some research into ssh and its underlying cryptographic
>> methods and I have questions. I don't know whom else to ask and humbly
>> ask for forgiveness if I'm way OT.
>>
>> So, SSH us
On Sun, Mar 7, 2010 at 11:25 PM, Angelin Lalev wrote:
> Greetings,
>
> I'm doing some research into ssh and its underlying cryptographic
> methods and I have questions. I don't know whom else to ask and humbly
> ask for forgiveness if I'm way OT.
>
> So, SSH uses algorithms like ssh-dss or ssh-rsa
Greetings,
I'm doing some research into ssh and its underlying cryptographic
methods and I have questions. I don't know whom else to ask and humbly
ask for forgiveness if I'm way OT.
So, SSH uses algorithms like ssh-dss or ssh-rsa to do key exchange.
These algorithms can defeat any attempts on ea
11 matches
Mail list logo