On Tue, Feb 19, 2008 at 11:37:17AM +0900, Kuniyasu Suzaki wrote:
> 
>  >>From: Andrew Sackville-West <[EMAIL PROTECTED]>
> 
>  >>How does the system behave when the authentication server is down? How do 
> you deal
>  >>with a compromised authentication server? 
> 
> Client takes vulnerability check only. There is no action on the client.

I presume that the client exchanges some information with the
server. What happens when that server is compromised and sends
compromised information? 


A

ps. thanks for continuing to answer these question.

Attachment: signature.asc
Description: Digital signature

Reply via email to