Date: Mon, 18 Dec 2000 12:35:11 -0700 From: Brett Glass <brett@lariat.org> To: Moses Backman III <penguinjedi@home.com>, Todd Backman <todd@flyingcroc.net> Cc: freebsd-security@FreeBSD.ORG Subject: Re: woah Message-ID: <4.3.2.7.2.20001218123004.04888760@localhost> In-Reply-To: <20001218133716.A550@cg22413-a.adubn1.nj.home.com> References: <Pine.BSF.4.21.0012172347240.48779-100000@security1.noc.flyingcroc.net> <Pine.BSF.4.21.0012172347240.48779-100000@security1.noc.flyingcroc.net>
next in thread | previous in thread | raw e-mail | index | archive | help
All the author is saying is what has long been known: that Diffie-Hellman key exchange is subject to "man in the middle" attacks. There are several catches, though. First of all, the man needs to find a way to get into the middle in the first place. On the Internet, this isn't easy. Second, he needs to STAY there or the parties will find out that he was there. Third, he can't do much if there's a backchannel or a trusted third party through which the parties can verify each other's identities. --Brett At 06:37 AM 12/18/2000, Moses Backman III wrote: >> Read the full story here: >> http://securityportal.com/cover/coverstory20001218.html To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-security" in the body of the message
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?4.3.2.7.2.20001218123004.04888760>