[4606] in WWW Security List Archive

home help back first fref pref prev next nref lref last post

JAVA Security Risks

daemon@ATHENA.MIT.EDU (HAROLD SIDLER)
Thu Feb 27 16:46:51 1997

Date: 27 Feb 1997 12:55:05 -0600
From: HAROLD SIDLER <Harold.E.Sidler@msfc.nasa.gov>
To: "www-security@ns2.rutgers.edu" <www-security@ns2.rutgers.edu> (IPM Return requested) (Receipt notification requested),
        "nasirc@nasa.gov" <nasirc@nasa.gov> (IPM Return requested) (Receipt notification requested)
cc: PATTIE SANDERSON <Pattie.M.Sanderson@msfc.nasa.gov> (IPM Return requested),
        PAUL PALMER <Paul.Palmer@msfc.nasa.gov> (IPM Return requested)
Errors-To: owner-www-security@ns2.rutgers.edu



     I received a request to assess security risks associated with 
     the following three scenarios: 
     
     1.   Capability to execute locally created (trusted???) Java applets on a 
     workstation inside the firewall communicating with a Java application 
     running on a Web Server inside the firewall.
     
     2.  Capability to execute locally created (trusted???) Java applets on a 
     remote user computer outside the firewall communicating with a Java 
     application running on a Web Server outside the firewall.
     
     3.  Capability to execute locally created (trusted???) Java applets on a 
     remote user computer outside the firewall communicating with a Java 
     application running on a Web Server inside the firewall.
     
     It is scenario number three that concerns me the most since our current 
     firewall policy does allow for HTTP, HTTP proxies or SSL.  BTW our firewall 
     is ANS Interlock running on a Sun workstation.
     
     Locally created Java applets are refered to as "trusted," but once we 
     enable Java, how do we insure that foreign (potentially hostile) applets 
     are not imported?
     
     You may reply ot me directly at
     
          Harold.Sidler@msfc.nasa.gov
     
     THANKS...
     
     

home help back first fref pref prev next nref lref last post