Hello Scott,
I would review the scenario you mentioned and what I understand is that I
will have see if the model described by you is how a security model
works. I will also try to go through the earlier mails in this list to
know more about Kaboodle and Zebedee

Thanks,
Meenakshi

On Sun, 8 Dec 2002 16:00:36 -0800 (PST), "meenakshi arora"
<[EMAIL PROTECTED]> said:
> 
> --- "Scott C. Best" <[EMAIL PROTECTED]> wrote:
> > Date: Sat, 7 Dec 2002 21:52:57 +0000 (GMT)
> > From: "Scott C. Best" <[EMAIL PROTECTED]>
> > To: meenakshi arora <[EMAIL PROTECTED]>
> > CC: [EMAIL PROTECTED]
> > Subject: Kaboodle VPN overview
> > 
> > Meenakshi:
> > 
> >     Hello! The biggest limitation of the current VPN
> > feature
> > is the lack of peer review. :) That is, I believe it
> > works as follows:
> > 
> > 1. User1 on LAN1 downloads Kaboodle and registers
> > its VPN capabilities
> >    at www.GetEngaged.net. That is, they download a
> > "registration
> >    file", essentially a signed secret-key.
> > 2. User2 on LAN2 does the respective thing for their
> > network.
> > 3. User1 on LAN1 creates a Partnership file with
> > User2 on the same
> >    site. Both users download and install the
> > Partnership file,
> >    essentially a signed public key.
> > 4. USer1 or User2 then initiate a connection.
> > Kaboodle does a
> >    Gnutella search for the Partnership file
> > associated with the
> >    connection. Once the file is found, it is
> > authenticated on both
> >    sides using the secret-key information from #1.
> > 5. After authentication, a "control channel" is
> > setup using TCP port
> >    4282. An 16-char random string is transferred
> > across this channel.
> > 6. Using that string as a symmetric password, a
> > Zebedee connection
> >    is initiated from one side to the other, using a
> > user-defined
> >    TCP port (defaults to 11965, the Zebedee
> > default).
> > 7. All data transactions now go across this "data
> > channel".
> > 
> >     Version 0.99 (which you can get from the "alpha"
> > directory
> > on ftp.Kaboodle.org) should do all of this. I know
> > that using that
> > connection, I can do all of the above and then VNC
> > across the secure
> > connection (I can see from tcp-dumping the LAN
> > traffic that the
> > right ports are being used). I have just not
> > *confirmed* that the
> > security model works exactly as I have specified
> > above. One of the
> > coders may have, unknowingly, taken a shortcut in
> > the interest of
> > functionality.
> >     Would you be able to review such a thing?
> > 
> > thanks,
> > Scott
> > 
> > PS: It'd be great if you could join the
> > Kaboodle-devel email list.
> >     I've CC'd it here in my reply.
> > 
> > On Fri, 6 Dec 2002, meenakshi arora wrote:
> > 
> > > Hello Scott,
> > > Could you please send me the list of current
> > > limitations of the VPN feature which I can start
> > > working on. Also If you could send me other
> > features
> > > limitaions too I would like to review them.
> > >
> > > I would be needing your guidance to chose a
> > direction
> > > to start.
> > >
> > > Thanks,
> > > Meenakshi
> > 
> > 
> 
> 
> __________________________________________________
> Do you Yahoo!?
> Yahoo! Mail Plus - Powerful. Affordable. Sign up now.
> http://mailplus.yahoo.com
> 
-- 
  Meenakshi Vohra
  [EMAIL PROTECTED]

-- 
http://fastmail.fm - One of many happy users:
  http://www.fastmail.fm/docs/quotes.html


-------------------------------------------------------
This sf.net email is sponsored by:ThinkGeek
Welcome to geek heaven.
http://thinkgeek.com/sf
_______________________________________________
Kaboodle-devel mailing list
[EMAIL PROTECTED]
https://lists.sourceforge.net/lists/listinfo/kaboodle-devel

Reply via email to