-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Hi RJ LeVeque,

You make me curious -- a security hole that we all missed?

> PAYMENT_URL=  <----- COMMON ERROR IS THE DESTINATION. Extreme security
> breach.

You are not particularly clear.
Could you specify an example, perferrably tested on your own system?
With the technical details that make the hole open to exploitation?

I doubt if the problem you see will survive such a test. When you stay
abstract the problems seem apperant, but as soon as you work it out you see
what's done against it. Happened to me on countless occasions.

You do realise that the payment URL only accepts signed statements that are
based on a secret stored in the receiving account, right?  Of course, it would
be better to use pubkey crypto for this, but this is good enough in practice.

> Any common webmaster using the default SCI is vulnerable AND will lose money
> on lost purchases.

Provide technical details and stick to facts please -- the extrapolation is
trivial, unlike realising what precisely goes wrong.


BTW, a widely appreciated approach to security holes is to test them yourself,
send the exploit details in encrypted email to the system's maintainer, and
then hold back before publishing about it, to give e-gold a chance to repair,
and merchants to change their implementations.

Hope this helps,


Cheers,
Rick van Rein.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.0.6 (FreeBSD)
Comment: For info see http://www.gnupg.org

iD8DBQE8GyhVVVg0GvW60c0RAqlZAJ9zd9t3QgjnPel+MkKLmJ/KHxz+4wCeOG47
lWKhlTd/mcE7ulP5HPo7FFk=
=1hd8
-----END PGP SIGNATURE-----


---
You are currently subscribed to e-gold-tech as: archive@jab.org
To unsubscribe send a blank email to [EMAIL PROTECTED]

Reply via email to