[proposed fix] tinc has a security hole
Guus Sliepen
guus at sliepen.warande.net
Wed Sep 6 13:55:50 CEST 2000
On Tue, 29 Aug 2000, Guus Sliepen wrote:
> HELLO? overhead. Just start directly sending a public key.
>
> 2 send PUBLIC_KEY
> 3 send PUBLIC KEY
Uhm actually, we don't need to send those public keys at all, because we
will store each others public key locally. Let's use that for
authentication and the meta protocol. Using the meta protocol, a shared
secret key for the symmetric blowfish algorithm can be exchanged. So:
Client Server
--------------------------------------------------------------
Connects to server
Accepts connection, but waits
send tinc name
Looks up tinc name, if it exist
get the public key.
Send own tinc name, encrypted
with public key.
decrypt, look up public .
key of the server. .
. .
. .
V V
Rest of the authentication can now be done totally encrypted.
-------------------------------------------
Met vriendelijke groet / with kind regards,
Guus Sliepen <guus at sliepen.warande.net>
-------------------------------------------
See also: http://tinc.nl.linux.org/
http://www.kernelbench.org/
-------------------------------------------
---
TINC development list, tinc-devel at nl.linux.org
Archive: http://mail.nl.linux.org/tinc-devel/
More information about the Tinc-devel
mailing list