[Search for users] [Overall Top Noters] [List of all Conferences] [Download this site]

Conference noted::hackers_v1

Title:-={ H A C K E R S }=-
Notice:Write locked - see NOTED::HACKERS
Moderator:DIEHRD::MORRIS
Created:Thu Feb 20 1986
Last Modified:Mon Aug 03 1992
Last Successful Update:Fri Jun 06 1997
Number of topics:680
Total number of notes:5456

232.0. "How to combat node impersonation?" by FORTY2::ROBERTS (Ban slogans!) Tue Apr 15 1986 14:47

T.RTitleUserPersonal
Name
DateLines
232.1Another notesfile ...LATOUR::RASPUZZIMichael RaspuzziTue Apr 15 1986 15:095
    Perhaps you should pose this question in the DECnet-VAX notes file.
    It is located on BULOVA::DECNETVAX. Press KP7 to select this
    conference.
    
    Mike
232.2Sorry...TLE::BRETTWed Apr 16 1986 02:0311
    
    You can't, without exchanging some secret info on a secure link.
    
    The ONLY way is to get a trusted party to carry some secret info.
    between the two nodes (eg: a password, encryption key, or whatever).
    
    This is a standard problem in cryptology, and the above result
    is fairly obvious.  See, for example, recent conversations on
    net.crypt.
    
    /Bevin