Meenakshi:
Hello! I was wondering if you'd like me to email you a
copy of the 0.99 snapshot for your review. I've been testing it
today, and I think it's ready to be released.
thanks,
Scott
On Thu, 12 Dec 2002, Scott C. Best wrote:
> Meenakshi:
>
> Hello again. Some replies:
>
> > For the point 5 mentioned by you after authentication, I also need to
> > know that
> > Is the control channel which is setup between User1 and User2 secure
> > enough to send the 16-char random string (symmetric password) used for
> > Data Channel? I assume that the string sent over control channel is
> > encrypted somehow.
>
> Yes, the control channel is symmetrically encrypted. I am not
> sure how the symmetric keys are generated.
>
> > Also I assume that the control channel is used only to send the
> > symmetric password so that a data channel gets created for all data
> > transactions.
>
> Yes, correct.
>
> > Does the Control channel gets reused once a data channel is created or
> > is no longer needed ?
>
> I suppose it is no longer needed, as a Zebedee connection could
> be opened and used for all subsequent control channel needs. The control
> channel is still needed, of course.
>
> > Is their some lifetime concept for the data channel?
> > If I think of IKE (Internet Key Exchange) protocol used to negotiate
> > keys for IPSEC, Can I relate this Control channel to be similar to IKE
> > Phase1 and Data Channel to be similar to IKE Phase2 though I see lot of
> > difference in the IKE and Kaboodle implementation. It seems in Kaboodle
> > data keys are not negotiated/generated by both ends rather a symmetric
> > password from one end is transferred to the other party and then used
> > by both to make the data traffic secure.
>
> I believe the Zebedee channel will periodically renegotiate
> data-channel encryption keys. I don't think the Control channel does,
> however, you're right. Probably the best model for the future would be:
>
> 1. After authentication, Kaboodle used something like DH key exchange
> on port 4282 (maybe UDP).
> 2. Once that key is exchanged, Kaboodle uses it to establish a
> Zebedee-based control channel on TCP port 4282.
> 3. All subsequent control-channel exchanges done across the Zebedee
> based control channel.
>
> I'd have much easier answers to your questions if this is
> how it was done. :)
>
> -Scott
>
>
>
> > On Sun, 8 Dec 2002 16:00:36 -0800 (PST), "meenakshi arora"
> > <[EMAIL PROTECTED]> said:
> >
> > --- "Scott C. Best" <[EMAIL PROTECTED]> wrote:
> > Date: Sat, 7 Dec 2002 21:52:57 +0000 (GMT)
> > From: "Scott C. Best" <[EMAIL PROTECTED]>
> > To: meenakshi arora <[EMAIL PROTECTED]>
> > CC: [EMAIL PROTECTED]
> > Subject: Kaboodle VPN overview
> >
> > Meenakshi:
> >
> > Hello! The biggest limitation of the current VPN
> > feature
> > is the lack of peer review. :) That is, I believe it
> > works as follows:
> >
> > 1. User1 on LAN1 downloads Kaboodle and registers
> > its VPN capabilities
> > at www.GetEngaged.net. That is, they download a
> > "registration
> > file", essentially a signed secret-key.
> > 2. User2 on LAN2 does the respective thing for their
> > network.
> > 3. User1 on LAN1 creates a Partnership file with
> > User2 on the same
> > site. Both users download and install the
> > Partnership file,
> > essentially a signed public key.
> > 4. USer1 or User2 then initiate a connection.
> > Kaboodle does a
> > Gnutella search for the Partnership file
> > associated with the
> > connection. Once the file is found, it is
> > authenticated on both
> > sides using the secret-key information from #1.
> > 5. After authentication, a "control channel" is
> > setup using TCP port
> > 4282. An 16-char random string is transferred
> > across this channel.
> > 6. Using that string as a symmetric password, a
> > Zebedee connection
> > is initiated from one side to the other, using a
> > user-defined
> > TCP port (defaults to 11965, the Zebedee
> > default).
> > 7. All data transactions now go across this "data
> > channel".
> >
> > Version 0.99 (which you can get from the "alpha"
> > directory
> > on ftp.Kaboodle.org) should do all of this. I know
> > that using that
> > connection, I can do all of the above and then VNC
> > across the secure
> > connection (I can see from tcp-dumping the LAN
> > traffic that the
> > right ports are being used). I have just not
> > *confirmed* that the
> > security model works exactly as I have specified
> > above. One of the
> > coders may have, unknowingly, taken a shortcut in
> > the interest of
> > functionality.
> > Would you be able to review such a thing?
> >
> > thanks,
> > Scott
> >
> > > > PS: It'd be great if you could join the
> > > > Kaboodle-devel email list.
> > > > I've CC'd it here in my reply.
> > > >
> > > > On Fri, 6 Dec 2002, meenakshi arora wrote:
> > > >
> > > > > Hello Scott,
> > > > > Could you please send me the list of current
> > > > > limitations of the VPN feature which I can start
> > > > > working on. Also If you could send me other
> > > > features
> > > > > limitaions too I would like to review them.
> > > > >
> > > > > I would be needing your guidance to chose a
> > > > direction
> > > > > to start.
> > > > >
> > > > > Thanks,
> > > > > Meenakshi
> > > >
> > > >
> > >
> > >
> > > __________________________________________________
> > > Do you Yahoo!?
> > > Yahoo! Mail Plus - Powerful. Affordable. Sign up now.
> > > http://mailplus.yahoo.com
> > >
> > --
> > Meenakshi Vohra
> > [EMAIL PROTECTED]
> >
> > --
> > http://fastmail.fm - IMAP accessible web-mail
> >
>
>
-------------------------------------------------------
This SF.NET email is sponsored by: Order your Holiday Geek Presents Now!
Green Lasers, Hip Geek T-Shirts, Remote Control Tanks, Caffeinated Soap,
MP3 Players, XBox Games, Flying Saucers, WebCams, Smart Putty.
T H I N K G E E K . C O M http://www.thinkgeek.com/sf/
_______________________________________________
Kaboodle-devel mailing list
[EMAIL PROTECTED]
https://lists.sourceforge.net/lists/listinfo/kaboodle-devel