[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
Re: Finjan "SurfinGate"
Mike McNally wrote:
| Seems to me that putting together an ActiveX control that "sneaks" its
| way through the firewall risk policy wouldn't be hard. Unless the
| applet scanner actually simulates execution of the control under a
| variety of input conditions (and we know that's not likely) (but prove
| me wrong, please) there's not much it can do other than poke around and
| check what other DLL's the thing wants to access. It might be a bit
| harder to be sneaky in Java, but I certainly wouldn't bet I could look
| at an applet and guarantee its safety to any threshold (if I could, why
| not just do that in the browser?).
Browsers are big, complex bits of technology. If you built an
applet verifier that ran on a firewall, it could be substantially
smaller than the 6mb of Netscape3.0 (SunOS). Smaller code is easier
to verify, and less likely to contain bugs. In addition, you could be
more confident that your policy goals are met in controlling what
applets enter the perimiter that the firewall deliniates.
Deploying new browsers to every desktop can be challenging.
If you have a java-gw, there is a lesser need for new browsers
everywhere in response to bugs. Also, you may be able to get the
source to a verifier, but not to the browser.
Doing a good job in real time would be very tough. We need
signed capacity requirements, and an organization that will stand by
its certifications of security. I have at least one client who would
pay for certified ok applets. (Not certified origin, certified
non-malicious, for various values of non-malicious).
Adam
--
"It is seldom that liberty of any kind is lost all at once."
-Hume