Andrew Sackville-West <[EMAIL PROTECTED]>: > > On Tue, Feb 19, 2008 at 11:37:17AM +0900, Kuniyasu Suzaki wrote: > > > > >From: Andrew Sackville-West <[EMAIL PROTECTED]> > > >> > > >>How does the system behave when the authentication server is > > >>down? How do you deal with a compromised authentication server? > > > > Client takes vulnerability check only. There is no action on the client. > > I presume that the client exchanges some information with the > server. What happens when that server is compromised and sends > compromised information?
Presumably, that server is just as watched by another watcher. Who watches the watchers? > ps. thanks for continuing to answer these question. [I may not have the attributions right. Sorry.] -- Any technology distinguishable from magic is insufficiently advanced. (*) http://blinkynet.net/comp/uip5.html Linux Counter #80292 - - http://www.faqs.org/rfcs/rfc1855.html Please, don't Cc: me. -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]