lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date:	Thu, 21 Jun 2007 10:18:52 -0500
From:	Andrew McKay <amckay@...rs.ca>
To:	david@...g.hm
CC:	Alexandre Oliva <aoliva@...hat.com>,
	Alan Cox <alan@...rguk.ukuu.org.uk>,
	Linus Torvalds <torvalds@...ux-foundation.org>,
	Al Viro <viro@....linux.org.uk>,
	Bernd Schmidt <bernds_cb1@...nline.de>,
	Ingo Molnar <mingo@...e.hu>,
	Daniel Hazelton <dhazelton@...er.net>,
	Greg KH <greg@...ah.com>,
	debian developer <debiandev@...il.com>,
	Tarkan Erimer <tarkan@...one.net.tr>,
	linux-kernel@...r.kernel.org,
	Andrew Morton <akpm@...ux-foundation.org>
Subject: Re: Dual-Licensing Linux Kernel with GPL V2 and GPL V3

david@...g.hm wrote:
> On Thu, 21 Jun 2007, Alexandre Oliva wrote:
> 
>> On Jun 21, 2007, david@...g.hm wrote:
>>
>>> how exactly can they prevent a system that's been tampered with from
>>> accessing their network?
>>
>> By denying access to their servers?  By not granting whatever is
>> needed to initiate network sessions?
>>
>> And note, "it's been tampered with" is not necessarily enough of a
>> reason to cut someone off, it has to meet these requirements:
> 
> how can the server tell if it's been tampered with?
> 

I agree with this statement.  Imagine a proprietary private network where a 
device has been modified to run in an invisible promiscuous mode.  The device 
looks as if it isn't doing anything wrong, but is forwarding the network out 
another interface.  The only way to prevent that type of attack is to not allow 
unauthorized signed Kernels onto that network.

Andrew McKay
-
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Please read the FAQ at  http://www.tux.org/lkml/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ