I didn't say that MD5 would solve the configuration problems, but
that the fact that just mis-configuration errors can cause lots of
damage should clue people into the fact that the protocol has
vulnerabilities to deliberate attack.
Every protocol is vulnerable if the principals are
Yes, but... A protocol in which principal A's misconfiguration can
seriously harm principle B is more broken than one in which it
cannot. That's why the protocol for crossing a busy street includes
In addition to the light status, look for actual moving vehicles.
That way, you don't get run
On Mon, 4 Nov 2002, Eric Anderson wrote:
Time for a new metaphor, methinks.
There's one. Defensive networking :)
--vadim