next up previous contents
Next: Design goals Up: Proposed design Previous: Example

Integrity option

The Telnet protocol offer no form of detection of active attacks. This section suggests a way to detect active attacks using the standard Telnet option code scheme. Like the the encryption option, this option uses session keys exchanged during the authentication stage.





Asgaut Eng
Wed Apr 10 14:07:30 MET DST 1996