In message <6.2.3.4.2.20051017024019.054c0c90@xxxxxxxxxxxxxxx>, "JFC (Jefsey) M orfin" writes: >At 02:20 17/10/2005, Sam Hartman wrote: >>I think documenting this sort of thing would be useful. I think it is >>more often called covert channel analysis or examined under the >>heading of privacy implications of protocols. > >I would be interested in URL or RFC references. >Also, I understand you refer more to the analysis of existing normal entries? >Here I refer mainly to malignious inputs or the ill designedness of >some protocols. Covert channels are generally studied in the context of multi-level secure systems, i.e., ones with mandatory access controls that separate different security levels. Google will give you many good references on the first page of answers. --Steven M. Bellovin, http://www.cs.columbia.edu/~smb _______________________________________________ Ietf@xxxxxxxx https://www1.ietf.org/mailman/listinfo/ietf