Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

The PDF is dated from 2009 maybe it was common at the time to rely on MD5.


MD5 challenge/response auth today would typically be used in short-hop logins. It might be further protected with SSL on longer hops. For larger networks, I would assume you'd want to use Kerberos auth.




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: