If the attackerss have root on your authentication system, they won't 
need any certificates.

-- Marc Briceno <[EMAIL PROTECTED]>     Voice:   510-986-8770 x310
   Corporate Sales                FAX:     510-986-8777
   http://www.c2.net/

On Wed, 6 May 1998, Austin L. Gosling wrote:

> We have a system which relies on Apache+SSLeay for user authentication.
> The whole thing sits behind a firewall, and only essential services are
> up, but we have to consider the impact of someone successfully getting
> in to the server.
> 
> The possible security hazard I have in mind is, what if someone does
> manage to get into the server? They could conceivably add a CA public
> certificate of their own choosing to the CACertificateFile used by
> Apache+SSLeay, and then gain access to our system by writing their own
> certificate, which would be validated by the server based on the
> CACertificateFile contents.
> 
> Naturally, this file is read-only, etc., but root is root!
> 
> The only idea I've come up with so far is to put the CACertificateFile
> on some media which is _physically_ read-only (a floppy with the
> read-only tab set comes to mind). Is there a better solution?
> 
> Austin Gosling
> 
+-------------------------------------------------------------------------+
| Administrative requests should be sent to [EMAIL PROTECTED] |
| List service provided by Open Software Associates, http://www.osa.com/  |
+-------------------------------------------------------------------------+

Reply via email to