From: sameer <sameer@c2.org>
To: hfinney@shell.portal.com (Hal)
Message Hash: 8125ba11b5ff076008e2a8df7facafc9469d5608dbea75eed51c1cc17bc9dc0b
Message ID: <199509090450.VAA19757@infinity.c2.org>
Reply To: <199509081611.JAA05733@jobe.shell.portal.com>
UTC Datetime: 1995-09-09 04:55:45 UTC
Raw Date: Fri, 8 Sep 95 21:55:45 PDT
From: sameer <sameer@c2.org>
Date: Fri, 8 Sep 95 21:55:45 PDT
To: hfinney@shell.portal.com (Hal)
Subject: Re: GAK Hacks
In-Reply-To: <199509081611.JAA05733@jobe.shell.portal.com>
Message-ID: <199509090450.VAA19757@infinity.c2.org>
MIME-Version: 1.0
Content-Type: text/plain
>
> One would be to create a patcher which would let you change the set of
> certificate authorities accepted by the browser. Currently the browser
> accepts at least one (an internal Netscape test CA) which is not needed
> by end users. Maybe its public key could be statically overwritten by
> the patch program with the public key of the replacement CA. This sounds
> simple and safe. The patch program can confirm that the data being
> changed matches the test CA.
Where is the public key for the test CA available? Seems
pretty trivial to take those bits and just do a bit compare against
your netscape binary to find out where the key is stored within the
binary..
--
sameer Voice: 510-601-9777
Network Administrator FAX: 510-601-9734
Community ConneXion: The NEXUS-Berkeley Dialin: 510-658-6376
http://www.c2.org (or login as "guest") sameer@c2.org
Return to September 1995
Return to “sameer <sameer@c2.org>”