Harjit, Why do you ask?
Cheers, Wez @ RealVNC Ltd. > -----Original Message----- > From: Singh, Harjit (Mission Systems) [mailto:[EMAIL PROTECTED] > Sent: 30 March 2005 18:17 > To: Erik Soderquist; James Weatherall; vnc-list@realvnc.com > Subject: RE: Question > > Eric, > Assuming encryption is used, is step three encryption link > the same as in step 5 encryption or the encryption link is > negotiated again for step 5. > > Harjit Singh > > -----Original Message----- > From: Erik Soderquist [mailto:[EMAIL PROTECTED] > Sent: Wed 3/30/2005 10:37 AM > To: James Weatherall; Singh, Harjit (Mission Systems); > vnc-list@realvnc.com > Cc: > Subject: RE: Question > > > > I think this is the idea that is being sought: > > step 1.) tcp connection established > step 2.) authentication method selected/negotiated > step 3.) encrypted channel opened > step 4.) authentication occurs > step 5.) session proceeds (with or without encryption, > depending on > settings) _______________________________________________ VNC-List mailing list VNC-List@realvnc.com To remove yourself from the list visit: http://www.realvnc.com/mailman/listinfo/vnc-list