[Previous] [Next] [Index]
[Thread]
Applet security (was Re: ActiveX security hole reported).
At 11:54 AM 8/21/96 EDT, David M. Chess wrote:
>Well, here's one rather obvious scenario:
>
> - Java gets signature-authentication (as promised),
>
> - All major browsers add an option to discard any
> objects (applets, ActiveX controls, and so on)
> that are not signed by a registered-as-trusted
> party,
>...
> - therefore the only objects that anyone will
> realistically be able to use over the open Web
> will be objects produced and signed by parties
> that are in everyone's trust-database. We can
> speculate who that might be, but the makers of
> browsers and operating systems seem like very
> likely candidates, since systems can ship with
> their public keys pre-installed! *8)
The above is too binary for me (either I trust everything that's signed or
not). What I really want is authorization based on who signed the applet
or by anything signed by a particular CA. Any unsigned applet should be
relegated to working within the limited sandbox given to it by the browser.
I would then allow local filesystem access to applets signed by FOO, or by
users-with-certs-from-CAxxx, and/or allow remote network connections by
applets signed by FU and/or by users-with-certs-fromCAyyy&zzz...
Until then, how can I possibly trust automatically-loaded/run downloadable code?
I may trust one person signed by a particular CA to write applets that I'll
run outside of a sandbox, but not everyone that this particular CA trusts...
I haven't had time to keep up with what's being done in this area, so if some-
one is already working on the above (fine grain authz, not just signing) I'd
like to hear about it...
..Mike
Follow-Ups: