Jussi Peltola wrote:
On Tue, Jan 08, 2008 at 10:48:41AM -0500, Douglas A. Tutty wrote:
I suppose the only way to have a "trusted-secure" box and an
"untrusted-insecure" box with one disply/keyboard would be a KVM.
Actual, physical separation of the machines is the only 100% secure way
to prevent information from leaking between them. I'd be more worried
about the network cable between them than a KVM, though.
I looked at KVM and came to the same conclusion - that most now have some software (partly to allow the boot process to discover the keyboard, etc hardware), so there is a risk of some leakage. My configuration will be physical separation of secure box from main box with network cabling to the router as the only link. So my security measures on the secure box are a simple PF setup permitting only outgoing initiation of connections and some sort of restriction on the internet sites visited. i.e. simply setting up the appropriate bank sites as bookmarks and only using these as starting pages to visit. Plus maybe some form of whitelisting in the browser setup if I don't trust myself to be awake.

Unfortunately some bank sites do use javascript and I have a concern over cross site scripting - only because I have yet to look deeper into this to see what the risks are. But if I never visit non-bank sites is this a problem?

Russell

Reply via email to