In the first, anyone who has access to the TIS/PEM key database can modify it, set the "designated valid bit" and spoof you out.
Then again, if someone can get at your database, I would suspect that the same attack would work against your copy of the software. (i.e. person can access your files, person can replace your copy of the software with a spoof.) -Ray
| <Prev in Thread] | Current Thread | [Next in Thread> |
|---|---|---|
| ||
| Previous by Date: | Re: PEM and PCAs, Theodore Ts'o |
|---|---|
| Next by Date: | Re: PEM and PCAs, Ashar Aziz |
| Previous by Thread: | Re: PEM and PCAs, Ashar Aziz |
| Next by Thread: | Re: PEM and PCAs, Derek Atkins |
| Indexes: | [Date] [Thread] [Top] [All Lists] |