watsonbladd at gmail.com
Thu Oct 19 22:13:27 UTC 2006
What *exactly* are we talking about using HIP for? Node-to-node
connections, or the connections the client makes to tunnel traffic?
For the first one we have TLS. For the second one, HIP solves the wrong
problem. We want to authenticate nodes to users, not each to the other.
While HIP is more efficient then TLS, we could use SSH for the
connections to gain on efficiency.(Talking about the first problem).
SSH is one of the most scrutinized protocols in existence, so it could
be a good choice.
They who would give up an essential liberty for temporary security,
deserve neither liberty or security
-------------- next part --------------
A non-text attachment was scrubbed...
Size: 249 bytes
Desc: OpenPGP digital signature
More information about the tor-dev