[2854] in WWW Security List Archive

home help back first fref pref prev next nref lref last post

Re: Applet security (was Re: ActiveX security hole reported).

daemon@ATHENA.MIT.EDU (Paul Rarey)
Fri Aug 30 13:42:27 1996

From: Paul Rarey <Paul.Rarey@Clorox.com>
Date: Wed, 28 Aug 1996 17:04:44 -0700
In-Reply-To: Alireza Bahreman <bahreman@eit.com>
        "Re: Applet security (was Re: ActiveX security hole reported)." (Aug 27, 15:05)
Reply-To: Paul Rarey <Paul.Rarey@Clorox.com>
To: www-security@ns2.rutgers.edu
Errors-To: owner-www-security@ns2.rutgers.edu

On Aug 27, 15:05, Alireza Bahreman wrote:
> Subject: Re: Applet security (was Re: ActiveX security hole reported).
>
>EIT has developed two approaches for Applet Security (no fine grain auth):
>1) Use RSA to sign applets and verify at the browser side before allowing 
>access

What enveloping strategy would be used to carry the signature and object? 

>2) Wrap Applets inside MOSS messages (secure MIME)

This I like. The S/MIME folks will want it a different way though (I'm not keen 
on S/MIME). The down side is - I've heard a bit about MOSS being to "big" to 
easily implement (IMC Resolving Security work). 

How about something along the lines of rfc1847? 

>we have also thought of another alternative which we have not developed or 
>tested.  That is use of SSL to download applets (as in https://blaw.blaw...).

I don't see how SSL allows the execution engine (Java or ActiveX) to 
authenticate the object(s), only to authenticate the server it came from. Good, 
but seems complete.

[ snip ]

Cheers!
[ psr ]


home help back first fref pref prev next nref lref last post