In message
<6(_dot_)2(_dot_)3(_dot_)4(_dot_)2(_dot_)20051017024019(_dot_)054c0c90(_at_)mail(_dot_)jefsey(_dot_)com>,
"JFC (Jefsey) M
orfin" writes:
At 02:20 17/10/2005, Sam Hartman wrote:
I think documenting this sort of thing would be useful. I think it is
more often called covert channel analysis or examined under the
heading of privacy implications of protocols.
I would be interested in URL or RFC references.
Also, I understand you refer more to the analysis of existing normal entries?
Here I refer mainly to malignious inputs or the ill designedness of
some protocols.
Covert channels are generally studied in the context of multi-level
secure systems, i.e., ones with mandatory access controls that separate
different security levels. Google will give you many good references
on the first page of answers.
--Steven M. Bellovin, http://www.cs.columbia.edu/~smb
_______________________________________________
Ietf mailing list
Ietf(_at_)ietf(_dot_)org
https://www1.ietf.org/mailman/listinfo/ietf