Guus Sliepen <[EMAIL PROTECTED]> writes: > You clearly formulated what we are doing! We want to keep our crypto as > simple and to the point as necessary for tinc. We also want to > understand it ourselves.
There is nothing wrong with either goal. > Implementing our own authentication protocol helps us do all that. Implementing is fine. Designing, however, may have a world of problems. > Uhm, before getting flamed again: by "our own", I don't mean we think we > necessarily have to implement something different from all the existing > protocols. We just want to understand it so well and want to be so > comfortable with it that we can implement it ourselves. That's fine. There is nothing wrong with new implementations. My biggest concern is with people rolling their own crypto algorithms and protocols, not with people re-implementing them. If you are going to implement something on your own, though, may I strongly encourage you to write your code in a way that is inherently secure? Security is not only a question of correct protocols, but of good implementation. Avoiding buffer overflows, using principles like aperture minimization and least privilege, and a dozen other techniques will help you make your system far more secure than it would otherwise be. -- Perry E. Metzger [EMAIL PROTECTED] --------------------------------------------------------------------- The Cryptography Mailing List Unsubscribe by sending "unsubscribe cryptography" to [EMAIL PROTECTED]