1996-03-10 - Re: (Fwd) Gov’t run anon servers

Header Data

From: Rick Tait <rickt@psisa.com>
To: Gary Howland <gary@kampai.euronet.nl>
Message Hash: 11956a5bd29d77108d4581697c8ec086c6c2a319253de571d682a2ce31412590
Message ID: <2.2.32.19960310194049.006f9ecc@psisa.com>
Reply To: N/A
UTC Datetime: 1996-03-10 20:03:06 UTC
Raw Date: Mon, 11 Mar 1996 04:03:06 +0800

Raw message

From: Rick Tait <rickt@psisa.com>
Date: Mon, 11 Mar 1996 04:03:06 +0800
To: Gary Howland <gary@kampai.euronet.nl>
Subject: Re: (Fwd) Gov't run anon servers
Message-ID: <2.2.32.19960310194049.006f9ecc@psisa.com>
MIME-Version: 1.0
Content-Type: text/plain


At 11:38 AM 3/5/96 +0100, Gary Howland wrote:
>The passphrase could be kept in memory and entered
>every time the system is started.
>
>Gary

Right. Couldn't you insert some kind of var into the kernel, rebuild and
upon each reboot have the remailer process (which would have to be root
owned) check for the value of this? I am of course assuming that the owner
of the remailer has admin control over the box, which is kind of unscalable.
If someone does gain entry to the machine, he'd need root to skim through
the kernel memory, and since he wouldn't have access to the remailer src
(you don't have it online, right?) he'd have a hard time looking for what he
needed...

/rickt
_____________________________________________________________________
Rick Tait                                        rickt@psa.pencom.com
Unix cowboy, Technofuturist, Extropian, Crypto-anarchist, Brit Hacker






Thread