Date: Sun, 26 Feb 1995 11:13:06 -0800 From: "Jordan K. Hubbard" <jkh> To: hackers Cc: security Subject: key exchange for rlogin/telnet services? Message-ID: <199502261913.LAA29658@freefall.cdrom.com>
next in thread | raw e-mail | index | archive | help
You know the problem. You're sitting down at USENIX or your friend Bob's in Minnesota or some other gawdforsaken place and you have no way of knowing whether or not that password you just typed to log in to freefall was just sniffed by the entire undergraduate class of the local university (or their bored ISP). You can't set up a kerberos realm with everyone, so what you'd really just like to do is ensure that the endpoints are reasonably secure and encrypt everything going in between. A friend recerntly suggested a method for which my knowledge of the spelling may be incomplete, but I'll try: "Diffie-Hellman key exchange." Apparently you start out with a key pair on each end and then each raise eacy to the power of the other's public half and used the information derived to secure the link. Do any of you security weenies out there know what I'm talking about? Am I making any sense? Should I be locked up by the NSA for even suggesting this? Jordan
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?199502261913.LAA29658>