[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <467A96DC.1020906@iders.ca>
Date: Thu, 21 Jun 2007 10:18:52 -0500
From: Andrew McKay <amckay@...rs.ca>
To: david@...g.hm
CC: Alexandre Oliva <aoliva@...hat.com>,
Alan Cox <alan@...rguk.ukuu.org.uk>,
Linus Torvalds <torvalds@...ux-foundation.org>,
Al Viro <viro@....linux.org.uk>,
Bernd Schmidt <bernds_cb1@...nline.de>,
Ingo Molnar <mingo@...e.hu>,
Daniel Hazelton <dhazelton@...er.net>,
Greg KH <greg@...ah.com>,
debian developer <debiandev@...il.com>,
Tarkan Erimer <tarkan@...one.net.tr>,
linux-kernel@...r.kernel.org,
Andrew Morton <akpm@...ux-foundation.org>
Subject: Re: Dual-Licensing Linux Kernel with GPL V2 and GPL V3
david@...g.hm wrote:
> On Thu, 21 Jun 2007, Alexandre Oliva wrote:
>
>> On Jun 21, 2007, david@...g.hm wrote:
>>
>>> how exactly can they prevent a system that's been tampered with from
>>> accessing their network?
>>
>> By denying access to their servers? By not granting whatever is
>> needed to initiate network sessions?
>>
>> And note, "it's been tampered with" is not necessarily enough of a
>> reason to cut someone off, it has to meet these requirements:
>
> how can the server tell if it's been tampered with?
>
I agree with this statement. Imagine a proprietary private network where a
device has been modified to run in an invisible promiscuous mode. The device
looks as if it isn't doing anything wrong, but is forwarding the network out
another interface. The only way to prevent that type of attack is to not allow
unauthorized signed Kernels onto that network.
Andrew McKay
-
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at http://vger.kernel.org/majordomo-info.html
Please read the FAQ at http://www.tux.org/lkml/
Powered by blists - more mailing lists