Balazs Scheidler wrote:

 > [ discussion of using session keys to sign stuff deleted ]

Yes, you are absolutely right.  If you pre-negotiate a
session key then you can use it to sign any MAC's
as a way to do authentication of the correct data
and sender.

I will try to clarify the language.

 > Hmm... and do we want to define an UDP based protocol having this capability?
 > or we just state that in environments with this requirement TCP transport
 > has to be used. I agree in the second case.

I'm not saying it makes sense to use UDP.
I'm just saying that a high level requirements
doc doesn't care if somebody else wants to.
When we get down to actual protocol design,
then we can worry about it.

--
Chris Calabrese
Internet Infrastructure and Security
Merck-Medco Managed Care, L.L.C.
[EMAIL PROTECTED]
.



Reply via email to