On Jan 2, 2008, at 12:45 PM, Kevin Van Vechten wrote: > We're probably talking past each other, and I'm probably splitting > hairs. I disagree that the MITM can "acquire your password" but I > agree that a MITM could "masquerade as you." Well from a protocol perspective anyway; I guess we've established no clients are well-behaved. sigh. - Kevin