Perry E. Metzger (perry@piermont.com)
Mon, 28 Sep 1998 22:14:36 -0400
Michael Bauer writes:
> Has anybody performed or know of a cryptanalysis of the time-based
> password system used by Security Dynamics' SecurID - ACE/Server system? I
> heard a rumor that "holes" had been found in it.
It matters little. One time tokens are of limited utility in an
environment where you can seize an unprotected link after the one time
token is used to authenticate. In a world of TCP hijacking, who cares
if the one time system is good?
PErry
The following archive was created by hippie-mail 7.98617-22 on Sat Apr 10 1999 - 01:14:01