James,
I dont understand the context of your comment. But I have to look into all
security features built into the tool.
Harjit
-----Original Message-----
From: James Weatherall [mailto:[EMAIL PROTECTED]
Sent: Wed 3/30/2005 12:22 PM
To: Singh, Harjit (Mission Systems); 'Erik Soderquist';
[email protected]
Cc:
Subject: RE: Question
Harjit,
Why do you ask?
Cheers,
Wez @ RealVNC Ltd.
> -----Original Message-----
> From: Singh, Harjit (Mission Systems) [mailto:[EMAIL PROTECTED]
> Sent: 30 March 2005 18:17
> To: Erik Soderquist; James Weatherall; [email protected]
> Subject: RE: Question
>
> Eric,
> Assuming encryption is used, is step three encryption link
> the same as in step 5 encryption or the encryption link is
> negotiated again for step 5.
>
> Harjit Singh
>
> -----Original Message-----
> From: Erik Soderquist [mailto:[EMAIL PROTECTED]
> Sent: Wed 3/30/2005 10:37 AM
> To: James Weatherall; Singh, Harjit (Mission Systems);
> [email protected]
> Cc:
> Subject: RE: Question
>
>
>
> I think this is the idea that is being sought:
>
> step 1.) tcp connection established
> step 2.) authentication method selected/negotiated
> step 3.) encrypted channel opened
> step 4.) authentication occurs
> step 5.) session proceeds (with or without encryption,
> depending on
> settings)
_______________________________________________
VNC-List mailing list
[email protected]
To remove yourself from the list visit:
http://www.realvnc.com/mailman/listinfo/vnc-list