The document summarizes security issues with a single sign-on mechanism for distributed computer networks. It describes two impersonation attacks - the first allows a malicious service provider to recover a user's credential after communicating with them twice and impersonate the user. The second allows an outsider without credentials to access network services by impersonating any user. The document also notes these attacks apply to another similar single sign-on scheme. It proposes using an encryption technique to help repair the vulnerabilities.