Unauthenticated Diffie–Hellman, as an anonymous key agreement protocol, has long been known to be subject to man in the middle attack.
The Interlock Protocol was described[1] as a method to expose a middle-man who might try to compromise two parties that use anonymous key agreement to secure their conversation.
Davies and Price proposed the use of the Interlock Protocol for authentication in a book titled Security for Computer Networks.
MITM can be attempted using the attack described in the Bellovin paper (Z being the man-in-the-middle): In this case, A receives the data approximately after 3*T, since Z has to perform the interlocking exchange with B.
For this reason, the interlock protocol cannot be effectively used to provide authentication, although it can ensure that no third party can modify the messages in transit without detection.