In the first, anyone who has access to the TIS/PEM key database can modify it, set the "designated valid bit" and spoof you out.
Then again, if someone can get at your database, I would suspect that the same attack would work against your copy of the software. (i.e. person can access your files, person can replace your copy of the software with a spoof.) -Ray
<Prev in Thread] | Current Thread | [Next in Thread> |
---|---|---|
|
Previous by Date: | Re: PEM and PCAs, Theodore Ts'o |
---|---|
Next by Date: | Re: PEM and PCAs, Ashar Aziz |
Previous by Thread: | Re: PEM and PCAs, Ashar Aziz |
Next by Thread: | Re: PEM and PCAs, Derek Atkins |
Indexes: | [Date] [Thread] [Top] [All Lists] |