> There are the security issues, as mentioned last message; GET
>requests can be bookmarked and resubmitted, etc. Unfortunately this
>is a very high security context (for the same reasons, I have to be a
>bit vague about organization names, etc).
ah.. got it.
there *is* a workable solution, which will be relatively simple to
implement, based on a variant of the SKID2 authentication protocol.
unfortunately, there's a lot of background material to get through before
the explanation of the solution itself makes sense, and i'm still trying to
distill that into human terms.
talking about security and encryption would be *so* much easier if everyone
just understood notation like:
1) B -> A : Rb, S
2) A : Ra, Hk(RaRbC)a
3) A -> C : SRaHk(RaRbC)a
4) C -> B : SRaHk(RaRbC)a
5) B : S |-> Rb
6) B : Hk(RaRbC)b
7) Hk(RaRbC)a <=> Hk(RaRbC)b
;-)
mike stone <[EMAIL PROTECTED]> 'net geek..
been there, done that, have network, will travel.
____________________________________________________________________
--------------------------------------------------------------------
Join The NEW Web Consultants Association FORUMS and CHAT:
Register Today at: http://just4u.com/forums/
Web Consultants Web Site : http://just4u.com/webconsultants
Give the Gift of Life This Year...
Just4U Stop Smoking Support forum - helping smokers for
over three years-tell a friend: http://just4u.com/forums/
To get 500 Banner Ads for FREE
go to http://www.linkbuddies.com/start.go?id=111261
---------------------------------------------------------------------