Iain Buchanan wrote:
On Mon, 2005-06-20 at 16:54 -0700, David Busby wrote:
Gurus,
In this hypothetical situation how would someone break in or view the data
transmitted?
[snip]
Since traffic is limited to IPs that I trust and everyone must have a certificate signed by my CA how can
John Ziniti wrote:
Iain Buchanan wrote:
On Mon, 2005-06-20 at 16:54 -0700, David Busby wrote:
The hacker still would not be able to present a valid certificate,
though, right? This depends on what the OP meant when he said If the
client is not signed I generate and securely transmit a cert
Gurus,
In this hypothetical situation how would someone break in or view the data
transmitted?
Hardend Gentoo/Linux/Apache system with only port 443 open in a secure facility (please assume that hardend means
everything you, dear reader, would do to secure a box). Now this Apache server is
On Mon, 2005-06-20 at 16:54 -0700, David Busby wrote:
Gurus,
In this hypothetical situation how would someone break in or view the data
transmitted?
[snip]
Since traffic is limited to IPs that I trust and everyone must have a
certificate signed by my CA how can jerks break
into my
4 matches
Mail list logo