[1345] in Kerberos

home help back first fref pref prev next nref lref last post

Software Security

daemon@ATHENA.MIT.EDU (Henry Mensch)
Fri Apr 12 20:55:14 1991

Date: Fri, 12 Apr 91 10:32:53 -0700
From: henry@ads.com (Henry Mensch)
To: gta@beta.lanl.gov
Cc: kerberos@ATHENA.MIT.EDU
Reply-To: henry@ads.com

   Date: Thu, 11 Apr 91 16:40:49 -0600
   From: gta@beta.lanl.gov (Gail Anderson)

   We are investigating how to go about moving our network authentication
   to Kerberos.  As part of this, we must find means of assuring our
   security people that software we get from the network does not include
   intentional security holes.

this statement seems to imply that your security people "trusts"
software that you've purchased ...  i dare not say anything more, lest
we all fall off our chairs in riotous laughter ...

-- henry
--------


home help back first fref pref prev next nref lref last post