Comment Some more detail over at undeadly.org (Score 5, Informative) 162
And for that whirlwind tour of what's good in that system, take a peek at my OpenBSD and you slides.
And for that whirlwind tour of what's good in that system, take a peek at my OpenBSD and you slides.
Re-using the existing connection is of course useful to fend off the traditional killing techniques for rapid-fire password guessers (such as http://home.nuug.no/~peter/pf/... and similar), but you still have to come up with the set of bytes that will let you authenticate. Which leads to the other thing --
The clowns I have been writing about ("The Hail Mary Cloud" -- http://bsdly.blogspot.ca/2013/... and links therein) used a totally different approach, but the general advice re passwords and other issues given in the conclusions apply here too.
In English, every word can be verbed. Would that it were so in our programming languages.