Re: Gutmann Soundwave Therapy

2008-02-02 Thread Guus Sliepen
On Fri, Feb 01, 2008 at 02:51:36PM +0800, Sandy Harris wrote:

> What I don't understand is why you think tinc is necessary,
> or even worth the trouble.
> 
> IPsec is readily available -- built into Windows, Mac OS
> and various routers, and with implementations for Linux
> and all the *BSDs -- has had quite a bit of expert
> security analysis, and handles VPNs just fine.
> 
> Does tinc do something that IPsec cannot?

Yes, there are a few reasons why people use tinc instead of IPsec. Those
people who tried both tell me tinc is much easier to set up. Tinc
tunnels over UDP and/or TCP. This allows it to work in situations where
IPsec would not, for example behind (masquerading) firewalls.  Tinc does
not need fixed IP addresses at endpoints; endpoints can have more than
one IP address, or hostnames, so it even works when one has dynamic DNS.
With tinc, you can set up VPNs with more than 2 nodes, not by
configuring more tunnels, but just by specifying endpoints. Tinc itself
will handle the packet routing. It tries to set up a full mesh, but it
has a built-in routing protocol, not unlike OSPF, that can route packets
via intermediate nodes if that is necessary. As a side effect it
provides some redundancy.

-- 
Met vriendelijke groet / with kind regards,
  Guus Sliepen <[EMAIL PROTECTED]>


signature.asc
Description: Digital signature


Re: questions on RFC2631 and DH key agreement

2008-02-02 Thread Joseph Ashwood
- Original Message - 
From: "' =JeffH '" <[EMAIL PROTECTED]>

To: 
Cc: "' =JeffH '" <[EMAIL PROTECTED]>
Sent: Friday, February 01, 2008 1:53 PM
Subject: questions on RFC2631 and DH key agreement



(ya and yb) if { p, q, g, j } are known to both parties.


So if p, q, g are not static, then a simplistic, nominally valid, DH 
profile

would be to..
 a b
 --   --
 g, p, ya >
 <--- yb
..yes?


I would actually recommend sending all the public data. This does not take 
significant additional space and allows more verification to be performed. I 
would also suggest looking at what exactly the goal is. As written this 
provides no authentication just privacy, and if b uses the same private key 
to generate multiple yb the value of b will slowly leak.


Other than for b perhaps wanting to verify the correctness of { p, q, g, 
j }

("group parameter validation"), is there any reason to send q ?


You can then use the gpb trio for DSA, leveraging the key set for more 
capabilities.
   Joe 


-
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to [EMAIL PROTECTED]


Re: questions on RFC2631 and DH key agreement

2008-02-02 Thread ' =JeffH '
Oh, yeah, sorry, your diagram (or whoever drew it) does in fact answer my 
second question wrt what one needs to send over the wire wrt a simplistic DH 
profile. Just g, p, and a public key (y).

thanks again,


=JeffH


-
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to [EMAIL PROTECTED]


Re: questions on RFC2631 and DH key agreement

2008-02-02 Thread ' =JeffH '

[EMAIL PROTECTED] said:
> http://www.xml-dev.com/blog/index.php?action=viewtopic&id=196 

thanks, but that doesn't actually answer my first question. It only documents 
that a and b (alice and bob) arrive at the ZZ value independently. My question 
is actually concerning section 2.1.2 "Generation of Keying Material" in 
RFC2631. My interpretation is that both parties are expected to generate 
"keying material" per that section on their own, rather than one party doing 
so and transmitting the results to the other party. This may seem obvious to 
those steeped in the tradition here, but it perhaps isn't to outsiders (i have 
a foot in both worlds).

thanks,


=JeffH


-
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to [EMAIL PROTECTED]