[Home] [By Thread] [By Date] [Recent Entries]


> Indeed, if I get to filter *all* your accesses to the net, I can make
> you believe anything I want, by masquerading as all possible trusted
> third parties.  There's nothing to be done about this.

Well, kinda, but not really.  If I have a certificate from, say,
the real CA (i.e., Verisign), then you can't spoof me, you can only
deny me access.  That's why PKI (public key infrastructure) talks
about "out of band" configuration or validation of the root key.

In the Web world, all SSL-speaking browsers come with a list of root
certificates for CA's that issue SSL-certs.  As long as you trust
the certs that came with your browser, then even if I am sitting
as a lonely island completely with everyone one of my IP packets
under your control, you can't fool me.
        /r$
--
Rich Salz                  Chief Security Architect
DataPower Technology       http://www.datapower.com
XS40 XML Security Gateway  http://www.datapower.com/products/xs40.html
XML Security Overview      http://www.datapower.com/xmldev/xmlsecurity.html


Site Map | Privacy Policy | Terms of Use | Trademarks
Free Stylus Studio XML Training:
W3C Member