[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-ID: <alpine.LFD.0.999.0709201234090.14806@enigma.security.iitk.ac.in>
Date: Thu, 20 Sep 2007 12:45:14 +0530 (IST)
From: Satyam Sharma <satyam@...radead.org>
To: Valdis.Kletnieks@...edu
cc: Kyle Moffett <mrmacman_g4@....com>,
Trond Myklebust <trond.myklebust@....uio.no>,
"J. Bruce Fields" <bfields@...ldses.org>,
Jan Engelhardt <jengelh@...putergmbh.de>,
Linux Kernel Mailing List <linux-kernel@...r.kernel.org>
Subject: Re: NFS4 authentification / fsuid
Hi Valdis,
On Wed, 19 Sep 2007, Valdis.Kletnieks@...edu wrote:
>
> On Wed, 19 Sep 2007 01:16:28 EDT, Kyle Moffett said:
>
> > I am assuming that if the laptop has sufficiently important data on
> > it to warrant the above steps then I am also clueful enough to:
> > (A) Not carry the laptop around unsecured areas,
> > (B) Keep a close enough eye on it and be aware that it's gone by
> > the time they get to step 2, OR
> > (C) Pay somebody to build me a better physical chassis for my laptop
>
> Building a better chassis can be a challenge when the threat model really
> *does* include attacks by a well-funded TLA.
>
> http://www.epic.org/crypto/scarfo/murch_aff.pdf
Thanks for the link! And this was ... 1999 (!) Probably goes without
saying that physical hacking tricks have only become even more refined/
perfected by now :-)
> The FBI did an *initial* entry to survey the hardware, and then a total of
> *five* other entries before they actually installed it. Note the technical
> and legal requirements required on the KLS (it had to, among other things,
> capture PGP passphrases but *not* anything that was typed online).
Thanks,
Satyam
-
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at http://vger.kernel.org/majordomo-info.html
Please read the FAQ at http://www.tux.org/lkml/
Powered by blists - more mailing lists