>>Downloading each new browser version using HTTPS (with the previous
release)
>>would be advisable.
>Sorry, don't solve the problem.


I did not mean that it would solve the problem, just that it would make
getting a compromised browser less likely.

>HTTPS / SSL secures only the connection.
>Other attacks are:
>1. compromise the new browser on the server you download from.
>2. compromise the new browser on your local computer.
>The only way out would be:
>1.: the package on the server contains a digital signature
>     you can verify with a cert you get or verify on an other way.
>     And you install all programs with an local installer which
>     don't install packages without valid signature.
>     (So By By self extracting programs...)
>2.: while installing the program, you store a secure hash on some
>    other, unchangeable media (e.g. stored on CD).
>    And you verify the program with this secure hash bevore you start
>    the program.


I agree, that signing the code would be better than securing the download.
A new browser should be packaged inside an installation ActiveX for IE and a
SmartUpdate JAR file for Netscape.

>But both don't solve the boostrap problem:
>How do you get secure system you can start from ?


Of course.

Nicolas Roumiantzeff.

______________________________________________________________________
OpenSSL Project                                 http://www.openssl.org
User Support Mailing List                    [EMAIL PROTECTED]
Automated List Manager                           [EMAIL PROTECTED]

Reply via email to