Next: Copying Information, Previous: Criticism of Kerberos, Up: Top
This appendix specifies the non-standard protocol elements implemented by Shishi. By nature of being non-standard, everything described here is experimental. Comments and feedback is appreciated.