> Have a look at authsrv(6) in the manual. The authenticator sends a
> pair of tickets to the client, one encrypted with the client's own
> key and one encrypted with the server's key. That's what allows
> both the client and server to authenticate each other.

i stand corrected. also i confused cpuserver and authserver. and i
still don't have the details paged in, so thank you for contributing
another good summary :)

> Yes, I think you're probably right. I was thinking in terms of minimum
> lines of code to change, but other factors are also important.

i generally use the same tactic in regards to minimal changes, and i
certainly see it isn't used often enough in the field.
i think the rule also doesn't conflict with what happened: replacement
of outdated systems without good incremental path for future
improvements, with useful high-quality software developed from
scratch. it can happen, despite the late hype around
"enshittification".
lastly, rules are meant to be broken. the details just happen to
matter more than the rule of thumb here.

and again, anybody who knows crypthographers, since the approach is
rather modern, please help share cinap's paper, maybe even the code,
have a look, the more eyes the more better ;)

------------------------------------------
9fans: 9fans
Permalink: 
https://9fans.topicbox.com/groups/9fans/T56397eff6269af27-M925311bc2b8c990e6ba917ed
Delivery options: https://9fans.topicbox.com/groups/9fans/subscription

Reply via email to