A little help needed here. My following of this list is somewhat spotty
lately, but I seem to remember several statements fairly recently concerning
holes that had been found in S/KEY. Can one of you point me to a source that
covers/explains these holes, or simply tell me yourself? (Private e-mail would
be fine if you want to save some bandwidth on the list.)
Warren S. Moore, CISSP
Information Security Specialist
Cincinnati Bell Information Systems Inc.