[EMAIL PROTECTED] writes:

> However, Jeffery lobbied for them on the grounds that they were
> being used in some existing implementations (I don't remember which
> one, but it wasn't Kerberos V5), and that we should document what
> some implementations are using today.

I'm all for documenting things. What I'm trying to say is that there
might be a danger in having situations where people think that just
because it's using DES3 it's three times as secure, which might not be
the case.

/Johan

Reply via email to