On Tue, Feb 19, 2008 at 11:37:17AM +0900, Kuniyasu Suzaki wrote: > > >>From: Andrew Sackville-West <[EMAIL PROTECTED]> > > >>How does the system behave when the authentication server is down? How do > you deal > >>with a compromised authentication server? > > Client takes vulnerability check only. There is no action on the client.
I presume that the client exchanges some information with the server. What happens when that server is compromised and sends compromised information? A ps. thanks for continuing to answer these question.
signature.asc
Description: Digital signature