-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

> not really... the MITM could try to use the both passwords immediately and 
> fake the both other sides.
> If you dont have out-of-band means to verify the information from the peer 
> node, you have a connection to the wrong node and only see the forged 
> verification.
> 
> good byte

Point taken.

> So far a node is *passive* and won't react upon reception of any unknown data.
> If we want to tell the user that the password has already been used, we
> would need to change that behaviour :/
> 
> I'm not sure it's a good idea.
> 
> NextGen$

Ok, i'm wrong, i'm sure of it now.

                  - Volodya

- --
http://freedom.libsyn.com/       Voice of Freedom, Radical Podcast
http://freeselfdefence.info/     Self-defence wiki
http://www.kingstonstudents.org/ Kingston University students' forum

 "None of us are free until all of us are free."    ~ Mihail Bakunin
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.2.2 (GNU/Linux)

iD8DBQFF7xx1uWy2EFICg+0RAqhhAJ9+HEYmNnIGJgOxOiCPBFd/vyEE5wCeNZ4R
QTfj/YMD+sbhXHvraBmnUY8=
=WcV4
-----END PGP SIGNATURE-----

Reply via email to