From: Derek Atkins <warlord@Athena.MIT.EDU>
To: J. Michael Diehl <mdiehl@triton.unm.edu>
Message Hash: 263b2cbd54b871e72d162d863a7026493de8916079e4143a46904a46aaf93ae3
Message ID: <9304072151.AA07442@steve-dallas.MIT.EDU>
Reply To: <9304072132.AA14268@triton.unm.edu>
UTC Datetime: 1993-04-07 21:51:30 UTC
Raw Date: Wed, 7 Apr 93 14:51:30 PDT
From: Derek Atkins <warlord@Athena.MIT.EDU>
Date: Wed, 7 Apr 93 14:51:30 PDT
To: J. Michael Diehl <mdiehl@triton.unm.edu>
Subject: Re: Real-time BBS Encryption??
In-Reply-To: <9304072132.AA14268@triton.unm.edu>
Message-ID: <9304072151.AA07442@steve-dallas.MIT.EDU>
MIME-Version: 1.0
Content-Type: text/plain
-----BEGIN PGP SIGNED MESSAGE-----
> Or, we could impliment an "external protocal" like zmodem. This would simply
> take keystrokes, buffer them, then encrypt/decrypt them.
>
> Make the source portable, and obtainable.
I'm doing something like this for my Thesis (i.e., wait a couple of
weeks.. ;-) It's based upon Kerberos, but it will securely get you a
TGT on a server machine that is on the Internet from a client terminal
that is dialled up to it...
Moreover, you can extract the session key from the protocol, which
would allow for DES encryption of the session. While I haven't yet
implemented the encryption of the session, I have been able to obtain
kerberos tickets securely....
More info on request, or you can wait to read my thesis when it's
done...
Enjoy!
- -derek
PGP 2 key available upon request on the key-server:
pgp-public-keys@toxicwaste.mit.edu
- --
Derek Atkins, MIT '93, Electrical Engineering and Computer Science
Secretary, MIT Student Information Processing Board (SIPB)
MIT Media Laboratory, Speech Research Group
warlord@MIT.EDU PP-ASEL N1NWH
-----BEGIN PGP SIGNATURE-----
Version: 2.2
iQBuAgUBK8NMvzh0K1zBsGrxAQFQwwLECieud4DvqHhkxsjwmrHt4Unpq2eR9hlT
DKuKF2CqCfYVabks11r7TaZvrsSQ9Vs5zZFbXhfihaiQywTpdj2Bp8aSo0B+7paR
ukzbY3GT1RLcSRrK+6KjPGw=
=lzg8
-----END PGP SIGNATURE-----
Return to April 1993
Return to “J. Michael Diehl <mdiehl@triton.unm.edu>”