Cget, Cput, and Stage-Safe File Transport Tools for the InternetBy Bill Cheswick, Bell LaboratoriesSummary by Gordon Galligher The only reason for the creation of these routines was an immediate need for the "safe" transmission of information between a few hosts (on opposite sides of firewalls), and there was no time to wait for "official crypto" packages such as secure Telnet and IP version 6. Tools such as Kerberos and SSH work well now, but when these routines were created, Kerberos was very cumbersome and required extensive overhead, and SSH was fairly new.
Design goals included having UNIX-style tools (small, a tool for
each function) and an untrusting server (i.e., The first implementations used the Data Encryption Standard (DES) for the encryption, but now it uses HMAC/SHA for authentication. It is faster than DES, and it was determined that the real requirement was simply authenticating that the data were coming from the real owner, not that they had to be encrypted for security. The code can be obtained from the server ftp.research.bell-labs.com. Originally published in ;login: Vol. 22, No.2, April 1997.
|
webster@usenix.org
Last changed: May 28, 1997 pc |
|