On Sun, Nov 29, 2015 at 12:32 PM, U.Mutlu <[email protected]> wrote:

> Hi all,
> Of course the communication must be encrypted against passive MITM,
> and must also detect active MITM.


If you want to detect, but not prevent, active MITM, there's the approach
of a central key server with a "transparency log" to ensure global
consistency. A MiTM attack fundamentally requires that the key server
returns inconsistent results, which you can try to make detectable.

CONIKS is a proposal for this:
http://www.jbonneau.com/doc/MBBFF15-coniks.pdf
_______________________________________________
Messaging mailing list
[email protected]
https://moderncrypto.org/mailman/listinfo/messaging

Reply via email to