Andrew Sackville-West <[EMAIL PROTECTED]>:
> 
>  On Tue, Feb 19, 2008 at 11:37:17AM +0900, Kuniyasu Suzaki wrote:
> >  
> >  >From: Andrew Sackville-West <[EMAIL PROTECTED]>
> >  >>
> >  >>How does the system behave when the authentication server is
> >  >>down? How do you deal with a compromised authentication server?
> > 
> > Client takes vulnerability check only. There is no action on the client.
> 
>  I presume that the client exchanges some information with the
>  server. What happens when that server is compromised and sends
>  compromised information?

Presumably, that server is just as watched by another watcher.  Who
watches the watchers?


>  ps. thanks for continuing to answer these question.


[I may not have the attributions right.  Sorry.]
-- 
Any technology distinguishable from magic is insufficiently advanced.
(*)    http://blinkynet.net/comp/uip5.html      Linux Counter #80292
- -    http://www.faqs.org/rfcs/rfc1855.html    Please, don't Cc: me.


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED] 
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]

Reply via email to