Will Morton wrote: > Eric Rescorla wrote: >> >> May I ask why you don't just use TLS? >> > > I would if I could, believe me. :o) > > The negotiated key will be used for both reliable (TCP-like) and > non-reliable (UDP-like) connections, all tunnelled over a single UDP > port for NAT-busting purposes. For the TCP-like component, I want to > follow TLS as much as possible for obvious reasons.
Err ... DTLS, then? -- http://www.apache-ssl.org/ben.html http://www.thebunker.net/ ** ApacheCon - Dec 10-14th - San Diego - http://apachecon.com/ ** "There is no limit to what a man can do or how far he can go if he doesn't mind who gets the credit." - Robert Woodruff --------------------------------------------------------------------- The Cryptography Mailing List Unsubscribe by sending "unsubscribe cryptography" to [EMAIL PROTECTED]
