Comment Some more detail over at undeadly.org (Score 5, Informative) 162
And for that whirlwind tour of what's good in that system, take a peek at my OpenBSD and you slides.
And for that whirlwind tour of what's good in that system, take a peek at my OpenBSD and you slides.
Re-using the existing connection is of course useful to fend off the traditional killing techniques for rapid-fire password guessers (such as http://home.nuug.no/~peter/pf/... and similar), but you still have to come up with the set of bytes that will let you authenticate. Which leads to the other thing --
The clowns I have been writing about ("The Hail Mary Cloud" -- http://bsdly.blogspot.ca/2013/... and links therein) used a totally different approach, but the general advice re passwords and other issues given in the conclusions apply here too.
The only possible interpretation of any research whatever in the `social sciences' is: some do, some don't. -- Ernest Rutherford