[39545] in Cypherpunks

home help back first fref pref prev next nref lref last post

Re: NYT on Netscape Crack

daemon@ATHENA.MIT.EDU (Michael Shields)
Wed Sep 20 02:52:29 1995

From: shields@tembel.org (Michael Shields)
To: sameer@c2.org (sameer)
Date: Wed, 20 Sep 1995 06:48:09 +0000 (GMT)
Cc: rjc@clark.net, sameer@c2.org, perry@piermont.com, cypherpunks@toad.com
In-Reply-To: <199509190748.AAA03614@infinity.c2.org> from "sameer" at 1995-09-19 00:48:05

> 	The server process itself still needs access to that file
> though in order to verify passwords, so it can't be totally
> protected-- a bug in the server might reveal the password file. A
> relatively minor point..

Actually, it could communicate with a differently-privileged process.
The security gain probably isn't worth the performance hit, though.

(A possible secure channel: Give the password manager a uid of its own.
Have it listen on a unix-domain socket.  The server process opens the
socket, then fstat()s it to make sure it's really owned by the password
manager.)
-- 
Shields.

home help back first fref pref prev next nref lref last post