Hi, On Mon, Mar 09, 2015 at 08:46:10PM +0100, daniel kubec wrote: > It is nothing more then generating same keying material for client and > server plugins (OPENVPN_PLUGIN_TLS_FINAL callback) > without the need of transfer that key throught (D)TLS channel and/or app > layer.
Why is it so hard to describe a good use case along the lines of what I described here? > On 9 March 2015 at 20:02, Gert Doering <g...@greenie.muc.de> wrote: [..] > > No code needed. Just describe the parts that would be needed to make > > this work - like "on the server, you need a plugin that talks to > > foobar service to get a blinkenlight, on the client, you need a plugin > > that uses EKM to make the light blink, via..." [..] You have written a lot of crypto speak, and added a bit of handwaving why this is totally useful - but no specific example, how the bits and pieces have to be combined to make it work. Of course, single-sign-on would be extremely great - but I lack the crypto background (or the imagination) to see how this could be implemented using EKM - so, please explain it to us. gert -- USENET is *not* the non-clickable part of WWW! //www.muc.de/~gert/ Gert Doering - Munich, Germany g...@greenie.muc.de fax: +49-89-35655025 g...@net.informatik.tu-muenchen.de
pgpiPEikzNoDs.pgp
Description: PGP signature