1995-01-30 - Re: ESP Unix encrypted session protocol software

Header Data

From: Thomas Grant Edwards <tedwards@src.umd.edu>
To: Matt Blaze <mab@research.att.com>
Message Hash: 9fcc5e9263c69c4345c8ebaa0936bbef5bd89d670c3847880f6b53354cce1406
Message ID: <Pine.SUN.3.91.950130124020.24102B-100000@thrash.src.umd.edu>
Reply To: <9501301554.AA08155@merckx.info.att.com>
UTC Datetime: 1995-01-30 17:42:48 UTC
Raw Date: Mon, 30 Jan 95 09:42:48 PST

Raw message

From: Thomas Grant Edwards <tedwards@src.umd.edu>
Date: Mon, 30 Jan 95 09:42:48 PST
To: Matt Blaze <mab@research.att.com>
Subject: Re: ESP Unix encrypted session protocol software
In-Reply-To: <9501301554.AA08155@merckx.info.att.com>
Message-ID: <Pine.SUN.3.91.950130124020.24102B-100000@thrash.src.umd.edu>
MIME-Version: 1.0
Content-Type: text/plain


On Mon, 30 Jan 1995, Matt Blaze wrote:

> ESP is an encrypted session protocol layer for managing remote
> encrypted sessions.  It does 1024 bit DH key exchange (from RSAREF)
> and 3-des in 8bit cfb mode for the traffic encryption.

I'm curious what Matt and others think about the possibility of the DH key
exchange being spoofed by an interloper in this application. 

-Thomas






Thread