next up previous contents
Next: Originality and limitations of Up: The ProtoWrap wrapper implementation Previous: SSL encrypted protocols   Contents


Validity of data

The facts presented in this study have been gathered from many security sources, including personal experiences of various systems administrators and programmers, different security mailing lists, conferences, magazines and books.

The solution suggested in this work, although formally justified and having been presented at conferences and discussed with peers, has not been thoroughly tested, though, so once again it is necessary to insist that it should still be considered a proof of concept. Different implementations of this idea can be more efficient, more secure or better programmed overall. However, the author is confident the actual implementation is good enough as a base for future work, and, with not too much extra work, can become a real, useful security tool.



Gunnar Wolf
2001-03-12