24 Jan
2003
24 Jan
'03
09:10
* Achim Hoffmann wrote on Thu, Jan 23, 2003 at 23:15 +0100:
Things might get more complicated for attackers if you use for example LDAP as authentification, there it's not that simple to get valid usernames.
Yes, interesting point. But in practice I still think that there is a name (claim) and a secret (prove), and to get it clear, the secret is secret :) oki, Steffen -- Dieses Schreiben wurde maschinell erstellt, es trägt daher weder Unterschrift noch Siegel.