lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Date: Sun, 17 Aug 2008 17:11:21 -0400 From: David Collier-Brown <davecb@....com> To: Arjan van de Ven <arjan@...radead.org> Cc: Eric Paris <eparis@...hat.com>, Jan Harkes <jaharkes@...cmu.edu>, Rik van Riel <riel@...hat.com>, "Press, Jonathan" <Jonathan.Press@...com>, Alan Cox <alan@...rguk.ukuu.org.uk>, peterz@...radead.org, linux-kernel@...r.kernel.org, malware-list@...ts.printk.net, hch@...radead.org, andi@...stfloor.org, viro@...IV.linux.org.uk Subject: Re: [malware-list] TALPA - a threat model? well sorta. Arjan van de Ven wrote: > Eric Paris <eparis@...hat.com> wrote: >>/me is HSM clueless and trying to include their needs is proving a >>challenge. > > > I bet it's the same; until you read/mmap... no need to get the data. > > you wouldn't want an "ls -l" or "find" to restore your entire system > from tape after all :) > The HSMs I'm familiar with keep the inode and the first block of the file on-disk, so that stat and file commands work. For Windows, you also need to keep the pointer to the icon to use valid, or create a fake one. --dave -- David Collier-Brown | Always do right. This will gratify Sun Microsystems, Toronto | some people and astonish the rest davecb@....com | -- Mark Twain cell: (647) 833-9377, bridge: (877) 385-4099 code: 506 9191# -- To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to majordomo@...r.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at http://www.tux.org/lkml/
Powered by blists - more mailing lists