--On 26 September 2011 12:30:48 +0200 Folkert van Heusden <[email protected]> wrote:
>>> we'll only do one hash >>> at the beginning of the connection >> Hopefully you'll do at least 2, and (if authenticating the other way) 4! >> But yes. > > Why 2/4? 2 because you have to carry out the hash on both ends in order to compare them. 4 because as I said, you may wish to authenticate server to client, as well as client to server. The remark was slightly facetious as even 4 very slow hash operations would be just fine. It's an O(0) optimisation. > If you're not sure about the hash collisions, use a hash with more > bits. E.g. sha512. I don't think hash collisions have anything to do with it. -- Alex Bligh ------------------------------------------------------------------------------ All the data continuously generated in your IT infrastructure contains a definitive record of customers, application performance, security threats, fraudulent activity and more. Splunk takes this data and makes sense of it. Business sense. IT sense. Common sense. http://p.sf.net/sfu/splunk-d2dcopy1 _______________________________________________ Nbd-general mailing list [email protected] https://lists.sourceforge.net/lists/listinfo/nbd-general
