John Ziniti wrote:
Iain Buchanan wrote:
On Mon, 2005-06-20 at 16:54 -0700, David Busby wrote:
The hacker still would not be able to present a valid certificate,
though, right? This depends on what the OP meant when he said "If the
client is not signed I generate and securely transmit a cert t
Iain Buchanan wrote:
On Mon, 2005-06-20 at 16:54 -0700, David Busby wrote:
Gurus,
In this hypothetical situation how would someone break in or view the data
transmitted?
[snip]
Since traffic is limited to IPs that I trust and everyone must have a certificate signed by my CA how can jerk
On Mon, 2005-06-20 at 16:54 -0700, David Busby wrote:
> Gurus,
>In this hypothetical situation how would someone break in or view the data
> transmitted?
[snip]
>Since traffic is limited to IPs that I trust and everyone must have a
> certificate signed by my CA how can jerks break
> into
Gurus,
In this hypothetical situation how would someone break in or view the data
transmitted?
Hardend Gentoo/Linux/Apache system with only port 443 open in a secure facility (please assume that hardend means
everything you, dear reader, would do to secure a box). Now this Apache server is c
4 matches
Mail list logo