A method and apparatus for establishing authenticated network (e.g.,
TCP/IP) connections augments the network (e.g., TCP/IP) protocol and
enables concealment of the presence of network (e.g., TCP/IP) servers on
the network. One methodology uses one or more cryptographic techniques,
and/or combinations of such techniques, to achieve the goal. A network
(e.g., TCP/IP) connection establishment could be authenticated using both
shared secret cryptographic and public key cryptographic methods. The
trust between peers could be established either directly or via a trusted
third party. One methodology allows network (e.g., TCP/IP) server
concealment against Internet based eavesdroppers and eavesdroppers
staging man-in-the-middle attacks on the local network or in the close
proximity to the server. The techniques described herein may be used to
protect a network (e.g., TCP/IP) server from establishing unsanctioned
connections from both local and remote networks.