> From: dOE [mailto:doep...@gmail.com] 
> Subject: Re: Security issues sending broadcast traffic.
> 
> It is generally safer for a higher security zone to have 
> read\write access to a lower security zone.  It would be 
> more of a risk for the lower zone to be able to read\write
> to the higher zone.

Not correct (speaking from experience of getting a B1 rating for our 
proprietary OS).

We're talking about sending messages here, not direct reads or writes.  
Whenever a higher security component sends a message to a lower security one, 
there is the risk that the higher security component might be including 
information classified at that higher security level that should not be visible 
to any lower security componenents.  Any higher security entity must be 
evaluated and trusted before it can be allowed to participate in such potential 
declassification.  (E.g., an authentication provider has to be validated not to 
disclose the passwords it has access to.)

A lower security component may always send a message to a higher security one, 
and a higher security one may always read messages from lower security 
components.

> The application in the higher zone sends a multi-cast 
> broadcast to nodes in its broadcast domain to indicate
> "changes" (whatever it may be be).

Doesn't sound like much of a declassification risk, as long as you trust the 
higher zone application not to accidentally broadcast information it is privy 
to (e.g., junk left over in transmission buffers or reused character/byte 
arrays).

 - Chuck


THIS COMMUNICATION MAY CONTAIN CONFIDENTIAL AND/OR OTHERWISE PROPRIETARY 
MATERIAL and is thus for use only by the intended recipient. If you received 
this in error, please contact the sender and delete the e-mail and its 
attachments from all computers.

---------------------------------------------------------------------
To unsubscribe, e-mail: users-unsubscr...@tomcat.apache.org
For additional commands, e-mail: users-h...@tomcat.apache.org

Reply via email to