I find a central issue that often reoccurs when discussing secure protocols
is the definition of where the secure protocol starts and stops - the user,
the application, or some underlying OS/functional library or network device?

There are usually huge chasms between the business, legal and
technical/security guru perspective on this - but in my experience these
differences significantly influence purchase and implementation budget
decisions.

Lyal

-----Original Message-----
From: [EMAIL PROTECTED]
[mailto:[EMAIL PROTECTED] On Behalf Of Jeremy
Bishop
Sent: Tuesday, 14 March 2006 10:40 AM
To: full-disclosure@lists.grok.org.uk
Subject: Re: [Full-disclosure] HTTP AUTH BASIC monowall.


On Monday 13 March 2006 15:17, Lyal Collins wrote:
> Yup, that's right: All PKI authentication is only as good as the 
> passwords protecting private keys where such passwords exist, and the 
> complementary endpoint security controls.

<snip>

I thought you might be meaning something like that.  I would say that 
these problems are out of scope for a discussion of secure 
communication protocols.  E.g. Alice is considered synonymous with her 
computer.  Once you open up the possibility that Alice (or Bob) have 
been hacked, there's no real point to discussing how to secure her 
communications.  But in a more pedantic sense, yes, you are correct.

Jeremy

-- 
Fix reason firmly in her seat, and call to her tribunal every fact, every
opinion. Question with boldness even the existence of a god; because, if
there be one, he must approve the homage of reason rather than of
blind-folded fear.
                     -- Thomas Jefferson, 1787

_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Reply via email to