[153] in WWW Security List Archive

home help back first fref pref prev next nref lref last post

Re: what are realistic threats?

daemon@ATHENA.MIT.EDU (hallam@dxal18.cern.ch)
Thu Sep 29 13:22:38 1994

From: hallam@dxal18.cern.ch
To: tmplee@MR.Net (Theodore M.P. Lee), www-security@ns1.rutgers.edu
Cc: hallam@dxal18.cern.ch
In-Reply-To: Your message of "Wed, 28 Sep 94 15:34:12 CST."
             <199409282032.PAA03101@riverside.mr.net> 
Date: Thu, 29 Sep 94 11:07:46 +0100
Reply-To: hallam@dxal18.cern.ch


>OK.  What about trojan horses in
>a) ncsa mosaic?
>b) ghostview?
>c) any or all of X?
>d) an http server?
>e) emacs/wordperfect/ms word?
>f) etc etc

This is why I think we need a standalone certificate scheme. The program may
reside on any server but has a certificate signed by the producer. Although
single rooted authentication hierarchies have problems most people would trust
the signature if signed by USGovt, MIT, W3O, AMEX and Peter Wright.

Phill. 

home help back first fref pref prev next nref lref last post