Skip site navigation (1)Skip section navigation (2)
Date:      Mon, 18 Dec 2000 12:35:11 -0700
From:      Brett Glass <brett@lariat.org>
To:        Moses Backman III <penguinjedi@home.com>, Todd Backman <todd@flyingcroc.net>
Cc:        freebsd-security@FreeBSD.ORG
Subject:   Re: woah
Message-ID:  <4.3.2.7.2.20001218123004.04888760@localhost>
In-Reply-To: <20001218133716.A550@cg22413-a.adubn1.nj.home.com>
References:  <Pine.BSF.4.21.0012172347240.48779-100000@security1.noc.flyingcroc.net> <Pine.BSF.4.21.0012172347240.48779-100000@security1.noc.flyingcroc.net>

next in thread | previous in thread | raw e-mail | index | archive | help
All the author is saying is what has long been known: that
Diffie-Hellman key exchange is subject to "man in the middle"
attacks. 

There are several catches, though.

First of all, the man needs to find a way to get into the
middle in the first place. On the Internet, this isn't
easy.

Second, he needs to STAY there or the parties will find
out that he was there.

Third, he can't do much if there's a backchannel or a
trusted third party through which the parties can verify
each other's identities.

--Brett

At 06:37 AM 12/18/2000, Moses Backman III wrote:

>> Read the full story here:
>> http://securityportal.com/cover/coverstory20001218.html



To Unsubscribe: send mail to majordomo@FreeBSD.org
with "unsubscribe freebsd-security" in the body of the message




Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?4.3.2.7.2.20001218123004.04888760>