-
First I just wanted to say: Thank you for this library! =) I also want to ask a short question: I want to make use of However, an additional authentication packet is needed for that, thus, it would be interesting to have that done already within |
Beta Was this translation helpful? Give feedback.
Replies: 2 comments 5 replies
-
The easiest way is to know the peer's public key instead of transmitting it. Without the corresponding secret key, an intermediary cannot compute the shared secret. If any public key has to be accepted, have the peer sign it, and verify it using a long-term public key. |
Beta Was this translation helpful? Give feedback.
-
Can you confirm that these of my assumptions are correct?
|
Beta Was this translation helpful? Give feedback.
The easiest way is to know the peer's public key instead of transmitting it. Without the corresponding secret key, an intermediary cannot compute the shared secret.
If any public key has to be accepted, have the peer sign it, and verify it using a long-term public key.