Hi Eric,

Eric Rescorla wrote:
But then the attacker isn't *intercepting* their communications.
Alice calls Bob and ends up talking to someone but she knows
that she doesn't know who. The point is you can't use this to
mount an MITM attack.

Again. I agree with what you said. What I was commenting on is the following text from the draft

"Bob would know that an attack was happening.  The fact that
 one side can detect this attack means that in most cases where Alice
 and Bob both wish the communications to be encrypted there is not a
 problem."

My question was, how would Bob detect this attack?

Thanks
Suresh

_______________________________________________
Sip mailing list  https://www.ietf.org/mailman/listinfo/sip
This list is for NEW development of the core SIP Protocol
Use [EMAIL PROTECTED] for questions on current sip
Use [EMAIL PROTECTED] for new developments on the application of sip

Reply via email to