[1187] in WWW Security List Archive

home help back first fref pref prev next nref lref last post

Re: Security via Sounding Impressive

daemon@ATHENA.MIT.EDU (Adam Shostack)
Mon Nov 20 21:09:54 1995

From: Adam Shostack <adam@bwh.harvard.edu>
To: rtor@ansa.co.uk (Owen Rees)
Date: Mon, 20 Nov 1995 18:13:49 -0500 (EST)
Cc: www-security@ns2.rutgers.edu
In-Reply-To: <9511201210.AA23684@plato.ansa.co.uk> from "Owen Rees" at Nov 20, 95 12:10:20 pm
Errors-To: owner-www-security@ns2.rutgers.edu

Owen Rees wrote:

| Unfortunately, it is all too common for a label to be attached to 
| something in the hope that this will magically cause the implied 
| properties to appear. For example, it is much better to call a server 
| "trusted" than "trustworthy", it does at least make it possible to 
| argue that there is a decision to be made about trust (this example is 
| taken from a real incident!)

Better yet, call it a trusted server offering only WWW service, and
strongly authenticated ftp.  This allows you to quantify your trust,
and if your scans detect something on telnetd's port, you know
there is a problem in that your model and reality have diverged.

Adam


-- 
"It is seldom that liberty of any kind is lost all at once."
					               -Hume


home help back first fref pref prev next nref lref last post