28.06.2013 Views

Papers in PDF format

Papers in PDF format

Papers in PDF format

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Content-Transfer-Encod<strong>in</strong>g: base64<br />

<br />

In general, applets are more complicated. Some require <strong>in</strong>put parameters and some refer to non standard<br />

classes. The Multipart/Related MIME Content-type [RELATED] could be used as a conta<strong>in</strong>er to <strong>in</strong>clude the<br />

applet, its <strong>in</strong>put data as well as other referred classes. S<strong>in</strong>ce the applet can be considered a data object with<strong>in</strong><br />

an HTML object, we envision a possible tight coupl<strong>in</strong>g between the MIME encapsulation of aggregate HTML<br />

documents [MHTML] work and the work presented here. For example, just like an image data would be<br />

<strong>in</strong>cluded <strong>in</strong> a MIME encapsulation of an HTML object with a tag, an applet data could be <strong>in</strong>cluded for<br />

an tag. For more detailed <strong>in</strong><strong>format</strong>ion, please read the full version of this paper [MAPPLET].<br />

Also please refer to our web site for the latest status of our implementation.<br />

Us<strong>in</strong>g MIME Security to Sign Applets<br />

The MIME encapsulation of an applet object is vulnerable to the same attacks as any other MIME object. In<br />

particular, it is possible for an active eavesdropper to modify the MIME message <strong>in</strong> transit. Therefore, neither<br />

the authenticity of the sender nor the <strong>in</strong>tegrity of the applet can be relied upon. The content of the MIME<br />

message may be seen by any passive eavesdropper. To combat these security concerns, the sender of the<br />

MIME message could sign and optionally encrypt the MIME message sent. The signature can be verified by<br />

the recipient (assum<strong>in</strong>g the public key of the sender is available) assur<strong>in</strong>g the authenticity of the sender and the<br />

<strong>in</strong>tegrity of the message contents. If encryption is performed, the recipient can decrypt and be assured that no<br />

<strong>in</strong>termediary was able to read the content of the message. Encryption provides for confidentiality of the applet<br />

dur<strong>in</strong>g transmit.<br />

The framework with<strong>in</strong> which security services may be applied to MIME body parts is described <strong>in</strong> [RFC1847].<br />

One can use Multipart/Signed and Multipart/Encrypted Content-Types to secure MIME objects. As an<br />

example, consider the use of the MOSS mechanism. To sign or encrypt the applet, the applet class files are<br />

encapsulated <strong>in</strong> Multipart/Related object which is <strong>in</strong> turn signed by MOSS and put <strong>in</strong>to a Multipart/Signed<br />

object. When the recipient gets the applet, they should verify the MOSS signature first before <strong>in</strong>vok<strong>in</strong>g any<br />

application to run the applet. If the signature verification fails, the recipient mail user agent should prompt the<br />

user a warn<strong>in</strong>g dialog before proceed<strong>in</strong>g to the next step of <strong>in</strong>vok<strong>in</strong>g and/or execut<strong>in</strong>g the applet. Other<br />

security considerations should follow the Java applet security guidel<strong>in</strong>es. For example, the Java applet and<br />

related classes should not be saved <strong>in</strong>to a directory which is specified <strong>in</strong> the CLASSPATH environment<br />

variable.<br />

Comparison with Other Approaches<br />

In [ENABLED-MAIL], the enabled or active messages are classified <strong>in</strong>to four categories based on four delivery<br />

phases: delivery-time, receipt-time, activation-time, and submission-time. The model presented <strong>in</strong> this<br />

document can be regarded as activation-time active messag<strong>in</strong>g, which is similar to Safe-Tcl approach <strong>in</strong> this<br />

sense.<br />

Compared to Java, Safe-Tcl lacks general purpose and <strong>in</strong>teroperability with WWW. There are several<br />

advantages of choos<strong>in</strong>g Java as a platform for active messag<strong>in</strong>g, ma<strong>in</strong>ly 1) <strong>in</strong>herent security check <strong>in</strong> Java<br />

Applet, 2) platform <strong>in</strong>dependence, and 3) uniform graphic <strong>in</strong>terface.<br />

Conclusions<br />

Embedd<strong>in</strong>g Java applets <strong>in</strong>to a MIME object can serve both the push and pull modes well. In addition,<br />

MIME/Java can take the advantage of several MIME based security mechanisms already <strong>in</strong> place, for example,<br />

MOSS [MOSS]. Therefore, our approach to active messag<strong>in</strong>g us<strong>in</strong>g MIME encapsulation is very promis<strong>in</strong>g.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!