Re: Release: KNOPPIX5.1.1 for Trusted Compuintg Geeks (v1.0)
Andrew Sackville-West <email@example.com>:
> On Tue, Feb 19, 2008 at 11:37:17AM +0900, Kuniyasu Suzaki wrote:
> > >From: Andrew Sackville-West <firstname.lastname@example.org>
> > >>
> > >>How does the system behave when the authentication server is
> > >>down? How do you deal with a compromised authentication server?
> > Client takes vulnerability check only. There is no action on the client.
> I presume that the client exchanges some information with the
> server. What happens when that server is compromised and sends
> compromised information?
Presumably, that server is just as watched by another watcher. Who
watches the watchers?
> ps. thanks for continuing to answer these question.
[I may not have the attributions right. Sorry.]
Any technology distinguishable from magic is insufficiently advanced.
(*) http://blinkynet.net/comp/uip5.html Linux Counter #80292
- - http://www.faqs.org/rfcs/rfc1855.html Please, don't Cc: me.