Re: Release: KNOPPIX5.1.1 for Trusted Compuintg Geeks (v1.0)
Andrew Sackville-West <andrew@farwestbilliards.com>:
>
> On Tue, Feb 19, 2008 at 11:37:17AM +0900, Kuniyasu Suzaki wrote:
> >
> > >From: Andrew Sackville-West <andrew@farwestbilliards.com>
> > >>
> > >>How does the system behave when the authentication server is
> > >>down? How do you deal with a compromised authentication server?
> >
> > Client takes vulnerability check only. There is no action on the client.
>
> I presume that the client exchanges some information with the
> server. What happens when that server is compromised and sends
> compromised information?
Presumably, that server is just as watched by another watcher. Who
watches the watchers?
> ps. thanks for continuing to answer these question.
[I may not have the attributions right. Sorry.]
--
Any technology distinguishable from magic is insufficiently advanced.
(*) http://blinkynet.net/comp/uip5.html Linux Counter #80292
- - http://www.faqs.org/rfcs/rfc1855.html Please, don't Cc: me.
Reply to: