On 12/06/12 14:42, Simon McVittie wrote:
> * Because Alice might be planning to authenticate Bob informally
>   by recognising his voice

As written, this is actually just leap-of-faith: it can't distinguish
between normal operation and a man-in-the-middle attack, unless there is
a handshake involving key material (the simplest case is Alice asking
Bob to read out his key fingerprint or something, but SRP or SMP with a
pre-shared secret would also work).

    S
_______________________________________________
telepathy mailing list
telepathy@lists.freedesktop.org
http://lists.freedesktop.org/mailman/listinfo/telepathy

Reply via email to