Rich Salz wrote:
> Another approach would be to double the number of systems that the adversary
> must compromise.  HostA will run the service, but only when HostB sends
> it startup info. At boot A pings B.  B "calls back" over over an SSL link
> and sends the passphrase using something like S/Key perhaps.

Does that double the number of systems? Surely all the adversary has to
do is substitute his own s/w for the thing that receives the passphrase
and reboot A, not requiring a crack of B at all.

Cheers,

Ben.

--
SECURE HOSTING AT THE BUNKER! http://www.thebunker.net/hosting.htm

http://www.apache-ssl.org/ben.html

"My grandfather once told me that there are two kinds of people: those
who work and those who take the credit. He told me to try to be in the
first group; there was less competition there."
     - Indira Gandhi

Reply via email to