Harjit,

Why do you ask?

Cheers,

Wez @ RealVNC Ltd.
 

> -----Original Message-----
> From: Singh, Harjit (Mission Systems) [mailto:[EMAIL PROTECTED] 
> Sent: 30 March 2005 18:17
> To: Erik Soderquist; James Weatherall; vnc-list@realvnc.com
> Subject: RE: Question
> 
> Eric,
> Assuming encryption is used, is step three encryption link 
> the same as in step 5 encryption or the encryption link is 
> negotiated again for step 5.
>  
> Harjit Singh
> 
>       -----Original Message----- 
>       From: Erik Soderquist [mailto:[EMAIL PROTECTED] 
>       Sent: Wed 3/30/2005 10:37 AM 
>       To: James Weatherall; Singh, Harjit (Mission Systems); 
> vnc-list@realvnc.com 
>       Cc: 
>       Subject: RE: Question
>       
>       
> 
>       I think this is the idea that is being sought:
>       
>       step 1.) tcp connection established
>       step 2.) authentication method selected/negotiated
>       step 3.) encrypted channel opened
>       step 4.) authentication occurs
>       step 5.) session proceeds (with or without encryption, 
> depending on
>       settings)
_______________________________________________
VNC-List mailing list
VNC-List@realvnc.com
To remove yourself from the list visit:
http://www.realvnc.com/mailman/listinfo/vnc-list

Reply via email to