[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

Re: Release: KNOPPIX5.1.1 for Trusted Compuintg Geeks (v1.0)

Andrew Sackville-West <andrew@farwestbilliards.com>:
>  On Tue, Feb 19, 2008 at 11:37:17AM +0900, Kuniyasu Suzaki wrote:
> >  
> >  >From: Andrew Sackville-West <andrew@farwestbilliards.com>
> >  >>
> >  >>How does the system behave when the authentication server is
> >  >>down? How do you deal with a compromised authentication server?
> > 
> > Client takes vulnerability check only. There is no action on the client.
>  I presume that the client exchanges some information with the
>  server. What happens when that server is compromised and sends
>  compromised information?

Presumably, that server is just as watched by another watcher.  Who
watches the watchers?

>  ps. thanks for continuing to answer these question.

[I may not have the attributions right.  Sorry.]
Any technology distinguishable from magic is insufficiently advanced.
(*)    http://blinkynet.net/comp/uip5.html      Linux Counter #80292
- -    http://www.faqs.org/rfcs/rfc1855.html    Please, don't Cc: me.

Reply to: