This document provides an analysis of the Secure Remote Password (SRP) protocol and highlights its functioning, including client-server authentication and the use of Diffie-Hellman key negotiation. It discusses a specific implementation vulnerability that allows an attacker to authenticate without knowing the password, and details the recommendations for safeguarding SRP against such attacks. The document also references a collaboration with the go-srp implementation team, who addressed the identified vulnerabilities promptly.