1. Based on what you have learned in this chapter, is it possible in TLS for the receiver to reorder TLS record blocks that arrive out of order? If so, explain how it can be done. If not, why not?
2. For SSH packets, the entire packet is encrypted excluding the MAC field after the MAC value is calculated. What if the MAC field is also included in the scope of packet encryption?
Already registered? Login
Not Account? Sign up
Enter your email address to reset your password
Back to Login? Click here