pem-dev
[Top] [All Lists]

Re: PEM and PCAs

1994-02-14 16:15:00
In the first, anyone who has access to the TIS/PEM key database can
modify it, set the "designated valid bit" and spoof you out.

Then again, if someone can get at your database, I would suspect that
the same attack would work against your copy of the software.  (i.e.
person can access your files, person can replace your copy of the software
with a spoof.)

 -Ray

<Prev in Thread] Current Thread [Next in Thread>