505
edits
| Line 113: | Line 113: | ||
* '''Action:''' We need to have exponential backoff for authentication failures. | * '''Action:''' We need to have exponential backoff for authentication failures. | ||
* '''Action:''' When downloading keys from the server, the client should generate the public key from the private instead of using what it just got. | * '''Action:''' When downloading keys from the server, the client should generate the public key from the private instead of using what it just got. | ||
* '''Action:''' NIST is encouraging people get away from 2k keys by the end of 2010. | * '''Action:''' NIST is encouraging people get away from 2k keys by the end of 2010. -- Not an issue. | ||
* Think of ways we can detect a hijack (someone could write a malicious add-on that starts directing users to their servers). | |||
edits