Tinc's response to "Linux's answer to MS-PPTP"

kent at songbird.com kent at songbird.com
Sat Sep 27 13:08:47 EDT 2003


On Fri, Sep 26, 2003 at 06:26:16PM -0700, Joseph Ashwood wrote:
> > First, keys for the
> > symmetric cipher encryption are exchanged. Mallet cannot decrypt keys he
> > gets from Bob and Alice, because he doesn't have their private keys.
> But he does, he spoofed each connection and acted as initiator for both,

Presuming that Bob and Alice have previously exchanged correct public
keys, how does he do that?

-- 
Kent Crispin                               "Be good, and you will be
crispin at icann.org,kent at songbird.com         lonesome."
p: +1 310 823 9358  f: +1 310 823 8649               -- Mark Twain

---------------------------------------------------------------------
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to majordomo at metzdowd.com



More information about the cryptography mailing list