1994-04-25 - Re: Wow, what a key!

Header Data

From: Ed Carp <ecarp@netcom.com>
To: “Timothy C. May” <tcmay@netcom.com>
Message Hash: 59d05565b5b42490fd6e7374e5bd8fbd987b943763e3a68b8fccf032d6ddab6b
Message ID: <Pine.3.89.9404251208.A28811-0100000@netcom10>
Reply To: <199404251926.MAA28155@netcom.com>
UTC Datetime: 1994-04-25 19:43:07 UTC
Raw Date: Mon, 25 Apr 94 12:43:07 PDT

Raw message

From: Ed Carp <ecarp@netcom.com>
Date: Mon, 25 Apr 94 12:43:07 PDT
To: "Timothy C. May" <tcmay@netcom.com>
Subject: Re: Wow, what a key!
In-Reply-To: <199404251926.MAA28155@netcom.com>
Message-ID: <Pine.3.89.9404251208.A28811-0100000@netcom10>
MIME-Version: 1.0
Content-Type: text/plain


On Mon, 25 Apr 1994, Timothy C. May wrote:

> > There is a 'pick her locks' joke here, but I'm not going to make it.
> > 
> 
> Another Floydian slip I see. Or is just another pick in the wall?
> 
> --Tim, who apologizes for these wastes of bandwidth but notes that
> Cyperpunks seem less interested in software and more interested in
> housing projects, guns, Oldsmobiles, and NSA manuals these days.

While I will say that guns and housing projects are important topics, as 
well as the loss of our individual freedoms, I will agree with my 
esteemed colleague from the great state of California that this list *is* 
about writing code, etc.

In that spirit, spurred on by my f**king netcom account being broken into 
by some idiot with a packet sniffer, I've been looking into hacking 
"pgptalk" (actually, ytalk with a popen() call to pgp and D-H key 
exchange) to provide the same sort of functionality for telnet.  The 
target platforms are SunOS (which is what netcom runs) and linux.

On first investigation, it doesn't look too hard to do the D-H key 
exchange stuff, as they are separated out into separate modules.  I've 
got the source for telnet/telnetd, and have added enhancements (like 
blasting out /etc/issue on connect), so I hope it won't be to difficult a 
project.

Sure would be nice to be able to do it in such a way that doesn't violate 
ITAR.  Does anyone know if D-H key exchange qualifies as restricted under 
the ITAR?  I can always do a popen() to pgp like ytalk does, and let the 
buyer be responsible for getting their hands on PGP or a look-alike.





Thread