Talk:Opportunistic encryption: Difference between revisions
Jump to navigation
Jump to search
imported>Sandy Harris (New page: {{subpages}}) |
imported>Howard C. Berkowitz (→I do hate to bring up layering. Really.: new section) |
||
Line 1: | Line 1: | ||
{{subpages}} | {{subpages}} | ||
== I do hate to bring up layering. Really. == | |||
Are the potential encryption modes learned in the source authentication process? Let's say, for example, two hosts are both capable of doing IPSec transport mode and SSL. How do they decide what to use if there are multiple options? If, in a given crypto protocol, there are different key lengths, timers, etc. -- do they negotiate? | |||
[[User:Howard C. Berkowitz|Howard C. Berkowitz]] 19:28, 30 August 2010 (UTC) |
Revision as of 13:28, 30 August 2010
I do hate to bring up layering. Really.
Are the potential encryption modes learned in the source authentication process? Let's say, for example, two hosts are both capable of doing IPSec transport mode and SSL. How do they decide what to use if there are multiple options? If, in a given crypto protocol, there are different key lengths, timers, etc. -- do they negotiate?
Howard C. Berkowitz 19:28, 30 August 2010 (UTC)