isn't that just what i said
seeing as how you seem only to be able to address me - don't!  if fact - go
away
if you were so smart - these people wouldn't keep asking the same questions
over and over and over
because they would have gotten the answers from you - obviously you're much
too good or lazy for them so

address those persons who seemingly can't read a thousand pages to get one
page of understanding.
Phd's write billions of words - but, with a single push of a button blow the
whole damn world up.
If you people didn't write about your life stories in the documents no one
would ever know you existed - 

maybe these people who don't know what you're talking about in Harvard terms
- wouldn't have to be explained in layman terms if you were backward
compatible.
Believe me - they understand exactly what it is I am saying
I really don't need you on the other end barfing crap at me.
Who put your XXs on the rock to walk anyway?
Did you discover intelligence or something that no one else has been able
to?
Oh crap - go humble yourself - someone else created the internet.  But, it
wasn't you.
So if you're not smart enough to be backward compatible - go away and only
speak to those who understand - you.  Don't try to piss on people with some
sort of holier than thou crap.
SSL is broken on a daily basis with the Bluecoat and just as easy as I said.
Go away and quit bothering me with whatever.

-----Original Message-----
From: David Schwartz [mailto:[EMAIL PROTECTED]
Sent: Tuesday, May 17, 2005 4:22 PM
To: openssl-users@openssl.org
Subject: RE: Re: simple question again



> This is why in my other replies to whomever - I made the
> statement about how
> fast all this can be done.  It takes at least 3 good handshakes to get
> onboard a SSL site - but, what matters the most is that
> &*_*&)^&^)*_**;qwepqowifskljfas that surrounds the key - is intact and not
> minus or plus one letter of symbol or corrupted in any way and what do the
> placements of those objects matter.  That's what is being looked
> for in the
> comparisons of the algorithms that do the checking.  Of course
> you want the
> inside data to be left intact - but, can you really do that and
> find it out
> without corrupting it's wrapper? in the length of time shorter
> than it takes
> for the originator to establish a legitimate connection?  NO - you cannot,
> unless you are running a seamless proxy intercepting  and passing
> on before
> you as you go.  No impossible - but, usually done only outside the United
> States where it's uncontrolled.  Most objects (subjects or persons --
> whatever) in the U.S. don't even have the education to go there - so why
> bother worrying about it.

        I have no idea what you are talking about and strongly suspect that
you
don't either. Modern cryptographic algorithms are carefully designed to
withstand attacks, even from atackers with full control over the data
proxied and even from attackers with computing power that vastly exceeds
that available at the endpoints. Designing or analyzing cryptographic
schemes as sloppily as you suggest above would be inexcusable professional
negligence.

        DS


______________________________________________________________________
OpenSSL Project                                 http://www.openssl.org
User Support Mailing List                    openssl-users@openssl.org
Automated List Manager                           [EMAIL PROTECTED]
______________________________________________________________________
OpenSSL Project                                 http://www.openssl.org
User Support Mailing List                    openssl-users@openssl.org
Automated List Manager                           [EMAIL PROTECTED]

Reply via email to