Marco Gaiarin schrieb:
> Mandi! Tomasz Chmielewski
>   In chel di` si favelave...
> 
>> As in 99% cases wpkg.js sits on the remote server, it is by definition 
>> insecure, isn't it?
> 
> It's a pint of view...
> 
>> Handling security by something which is hosted on a potentially not 
>> secure machine isn't the best idea - you would never know if it's your 
>> or attacker's wpkg.js.
> 
> Indeed ther's some different problems to take care.
> 
> What i'm speaking about is a:
> 
> a) an attacker have no access to the server (indeed, done that we have
>  no more things to speak about... ;), no access to the clients apart
> one/two to get some knowledge on the system
> 
> b) the attacker want to take control of all clients (that use WPKG, of
>  course).

Well, perhaps it suffices if WPKG service is started as a domain user, 
or WPKG path uses domain user credentials.

Then, Windows should take care of all security issues for us - no need 
to reinvent anything here, if the operating system already does it?


And Brian - what kind of tests did you really make?


-- 
Tomasz Chmielewski
http://wpkg.org


-------------------------------------------------------------------------
This SF.net email is sponsored by DB2 Express
Download DB2 Express C - the FREE version of DB2 express and take
control of your XML. No limits. Just data. Click to get it now.
http://sourceforge.net/powerbar/db2/
_______________________________________________
wpkg-users mailing list
wpkg-users@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/wpkg-users

Reply via email to