Menu

#6 Finding the nearest node - Security

open
nobody
None
3
2002-04-08
2002-03-20
No

I need to sit down and work through some scenarios, but
I suspect that this scheme is still susceptable to
integrity and authentification attacks (either
malicious end-points or malicious intercepting hosts
between two CJAN end-points).

Discussion

  • Nobody/Anonymous

    Logged In: NO

    Require material (code/document/jar/...) signing.

    This removes a major problem for CJAN administrators being
    expected to protect security. [ Legal ramifications of
    setting oneself up as a moderator/inpector ... ]

    - JonT

     
  • Anonymous

    Anonymous - 2002-04-08
    • priority: 5 --> 3
     

Log in to post a comment.

MongoDB Logo MongoDB