On Tue, Feb 19, 2008 at 11:37:17AM +0900, Kuniyasu Suzaki wrote: > > >>From: Andrew Sackville-West <firstname.lastname@example.org> > > >>How does the system behave when the authentication server is down? How do you deal > >>with a compromised authentication server? > > Client takes vulnerability check only. There is no action on the client. I presume that the client exchanges some information with the server. What happens when that server is compromised and sends compromised information? A ps. thanks for continuing to answer these question.
Description: Digital signature