|
Posted by Sanders Kaufman on 01/10/07 04:26
Gordon Burditt wrote:
> Unfortunately, with many protocols, you can't have both.
> Challenge-response protocols may require that you have the actual
> password, not a hash of it, on both sides to perform the
> challenge-response.
That's the OSI model at work there.
If you're not secure at the low levels, you're fooling yourself
to think your secure at the high levels.
Navigation:
[Reply to this message]
|