From: iang@cs.berkeley.edu (Ian Goldberg)
To: cypherpunks@toad.com
Message Hash: 085abaad600e7896a4cbace4c3fa3761d5dd1c2b7e881f21bc2a48e368aad77e
Message ID: <534nh8$c4p@abraham.cs.berkeley.edu>
Reply To: <199610021431.JAA02934@linkdead.paranoia.com>
UTC Datetime: 1996-10-05 07:57:16 UTC
Raw Date: Sat, 5 Oct 1996 15:57:16 +0800
From: iang@cs.berkeley.edu (Ian Goldberg)
Date: Sat, 5 Oct 1996 15:57:16 +0800
To: cypherpunks@toad.com
Subject: Re: encrypting pppd?
In-Reply-To: <199610021431.JAA02934@linkdead.paranoia.com>
Message-ID: <534nh8$c4p@abraham.cs.berkeley.edu>
MIME-Version: 1.0
Content-Type: text/plain
-----BEGIN PGP SIGNED MESSAGE-----
In article <961002.235706.1R8.rnr.w165w@sendai.scytale.com>,
Roy M. Silvernail <roy@scytale.com> wrote:
>In list.cypherpunks, vax@linkdead.paranoia.com writes:
>
>> Anyone worked on, or know of a freely available, one of these beasts?
>
>What threat model does this address? It'd be link encryption, where the
>best security is found in end-to-end encryption.
pppd doesn't necessarily run over a modem; you can "tunnel" it over another
IP connection.
I have in fact done this very thing. Use ssh to (encrypted) log in to
the ppp server, and start pppd at each end. It's been a while; I think I
had to tweak something to make it work over a pty instead of a serial port.
- Ian
-----BEGIN PGP SIGNATURE-----
Version: 2.6.2
iQCVAwUBMlXhZkZRiTErSPb1AQEidQP8DEYaAcDyJMFY7AyRL4Q03tD+REiqqKPZ
1I8stlu7sx9OVFAgitqAWeWdi5HeXop0YpyAP9yYFxI9JTw6TgXfpP2P38pJ3vvU
jebEyK+pVJnCw16As6rJJTNYlUFGlEqceuK8Bj4xNyrG1E4oGx8AEig4CT8RjGhk
AOj4aFd7y+8=
=aZOj
-----END PGP SIGNATURE-----
Return to October 1996
Return to “VaX#n8 <vax@linkdead.paranoia.com>”