In a recent note, Tom Schmidt said:

> Date:         Sat, 17 Feb 2007 23:31:25 -0600
> 
> What about sites that cannot allow any system-driven connections to the
> outside?  (See the DIACAP military requirements that Defense contractors
> have to abide by for details.)  "Phoning home" is not an option, especially
> for higher-security systems.
> 
> In these cases the vendor is not trusted, at least not enough for that type
> of contact.
> 
Well, you can't fight the military -- they've got the big guns.

But short of that, there seems to be an opportunity for a single
well-audited (source code available) component through which every
"phone home" would filter, verifying its parameter list against
a data base of permissible message recipients and contents, etc.

-- gil
-- 
StorageTek
INFORMATION made POWERFUL

----------------------------------------------------------------------
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html

Reply via email to