[Freeswitch-users] Protection with ZRTP

SERGE TUMBA serget68 at msn.com
Tue Apr 6 21:27:49 PDT 2010


I know that in ZRTP, the negotiation of the cryptographic keys takes place entirely in the RTP stream. However, I do not understand:

 

1. How can this be proven when having setup FreeSWITCH and having deployed ZRTP, and having two softphones (such as X-LITE) connected in a test environment. Can a tool cush as Wireshark or any other be used in this case?

 

2. What are other protection mechanisms provided to prevent third-parties from masquerading as one of the end-points?

 

Thank you!

 

Serge.




 


 		 	   		  
_________________________________________________________________
The New Busy think 9 to 5 is a cute idea. Combine multiple calendars with Hotmail. 
http://www.windowslive.com/campaign/thenewbusy?tile=multicalendar&ocid=PID28326::T:WLMTAGL:ON:WL:en-US:WM_HMP:042010_5
-------------- next part --------------
An HTML attachment was scrubbed...
URL: http://lists.freeswitch.org/pipermail/freeswitch-users/attachments/20100406/a41f072f/attachment.html 


More information about the FreeSWITCH-users mailing list