On Tuesday 03 June 2003 01:26 pm, Dave Hooper wrote:
> So:
> A->B what is my IP address
> B->A it is aaa.bbb.ccc.ddd
> A creates a long random number and makes it available at its FNP port as
> something like 'entropy.txt'
> A->C get the entropy.txt from aaa.bbb.ccc.ddd and send me the result
> C->aaa.bbb.ccc.ddd what is your entropy.txt?
> aaa.bbb.ccc.ddd->C this is my entropy.txt
> C->A this is your entropy.txt
How about this, which is simpler:
A->B what's my ip (same as above)
B->A a.b.c.d (same as above)
A->C connect to a.b.c.d and say 'foo'
C->a.b.c.d: foo
If A receives 'foo' from C, then a.b.c.d can be assumed to be valid.
--
"I love deadlines. I love the whooshing sound they make as they go by."
- Douglas Adams
Nick Tarleton - [EMAIL PROTECTED] - PGP key available
_______________________________________________
devl mailing list
[EMAIL PROTECTED]
http://hawk.freenetproject.org:8080/cgi-bin/mailman/listinfo/devl