1995-10-23 - Re: Encrypted TCP Tunneler

Header Data

From: Eric Young <eay@mincom.oz.au>
To: Enzo Michelangeli <enzo@ima.com>
Message Hash: 6acbf77155caf4f2f157a8ba0f7f73bac638ca38e5ee73263ae3e20cfa222b19
Message ID: <Pine.SOL.3.91.951023192908.6735B-100000@orb>
Reply To: <Pine.LNX.3.91.951023161515.27409A-100000@ima.net>
UTC Datetime: 1995-10-23 09:33:59 UTC
Raw Date: Mon, 23 Oct 95 02:33:59 PDT

Raw message

From: Eric Young <eay@mincom.oz.au>
Date: Mon, 23 Oct 95 02:33:59 PDT
To: Enzo Michelangeli <enzo@ima.com>
Subject: Re: Encrypted TCP Tunneler
In-Reply-To: <Pine.LNX.3.91.951023161515.27409A-100000@ima.net>
Message-ID: <Pine.SOL.3.91.951023192908.6735B-100000@orb>
MIME-Version: 1.0
Content-Type: text/plain


On Mon, 23 Oct 1995, Enzo Michelangeli wrote:
> Adding MD5 support wouldn't be a bad idea. Same for algorithms 
> alternative to Blowfish (3DES etc.) and DH (e.g., with Elliptic 
> functions-based key exchange), all automatically negotiated at connection 
> time.

Starting to sound like you want the crypto layer to be SSL (v3 for DH) or
PCT :-).

eric





Thread