Re: Avoiding man in the middle attacks

2000-11-02 Thread amanda
That is impossible. If you can't secure your Win9x client then you can never ever establish any kind of secure communication from that client. Security has to begin at the end points. After you secure the client's cerificate store you then use those certificates to secure the communication.

RE: Avoiding man in the middle attacks

2000-10-28 Thread Salvo Ilardo
Title: As somebody stated there is difference between authentication and authorization. Servers should be protected from "man in the middle" attacks via "Access Control" software which authorize access to files, servers, etc. via a triple combination of keys: FQDN (fully qualified domain

RE: Avoiding man in the middle attacks

2000-10-28 Thread David Schwartz
Greg Stark wrote: As somebody stated there is difference between authentication and authorization. Servers should be protected from "man in the middle" attacks via "Access Control" software which authorize access to files, servers, etc. via a triple combination of keys: FQDN (fully qualified

Avoiding man in the middle attacks

2000-10-26 Thread Darío Mariani
Hello: I'm still learning SSL. I still do no understand how does or if SSL/TSL prevents from a "man in the middle" attack. If the certificates are good, no problem. But, how does a client, or what must I do for a client to check the validity of a certificate, even a signed one from a trusted

Re: Avoiding man in the middle attacks

2000-10-26 Thread Michael Sierchio
Darío Mariani wrote: Hello: I'm still learning SSL. I still do no understand how does or if SSL/TSL prevents from a "man in the middle" attack. If the certificates are good, no problem. But, how does a client, or what must I do for a client to check the validity of a certificate, even a