1995-09-09 - Re: GAK Hacks

Header Data

From: sameer <sameer@c2.org>
To: hfinney@shell.portal.com (Hal)
Message Hash: 8125ba11b5ff076008e2a8df7facafc9469d5608dbea75eed51c1cc17bc9dc0b
Message ID: <199509090450.VAA19757@infinity.c2.org>
Reply To: <199509081611.JAA05733@jobe.shell.portal.com>
UTC Datetime: 1995-09-09 04:55:45 UTC
Raw Date: Fri, 8 Sep 95 21:55:45 PDT

Raw message

From: sameer <sameer@c2.org>
Date: Fri, 8 Sep 95 21:55:45 PDT
To: hfinney@shell.portal.com (Hal)
Subject: Re: GAK Hacks
In-Reply-To: <199509081611.JAA05733@jobe.shell.portal.com>
Message-ID: <199509090450.VAA19757@infinity.c2.org>
MIME-Version: 1.0
Content-Type: text/plain


> 
> One would be to create a patcher which would let you change the set of
> certificate authorities accepted by the browser.  Currently the browser
> accepts at least one (an internal Netscape test CA) which is not needed
> by end users.  Maybe its public key could be statically overwritten by
> the patch program with the public key of the replacement CA.  This sounds
> simple and safe.  The patch program can confirm that the data being
> changed matches the test CA.

	Where is the public key for the test CA available? Seems
pretty trivial to take those bits and just do a bit compare against
your netscape binary to find out where the key is stored within the
binary.. 

-- 
sameer						Voice:   510-601-9777
Network Administrator				FAX:	 510-601-9734
Community ConneXion: The NEXUS-Berkeley		Dialin:  510-658-6376
http://www.c2.org (or login as "guest")			sameer@c2.org




Thread