lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date:	Fri, 19 Jun 2009 13:52:02 -0400
From:	Valdis.Kletnieks@...edu
To:	Pavel Machek <pavel@....cz>
Cc:	James Morris <jmorris@...ei.org>,
	Joseph Cihula <joseph.cihula@...el.com>,
	Ingo Molnar <mingo@...e.hu>, linux-kernel@...r.kernel.org,
	arjan@...ux.intel.com, hpa@...or.com, andi@...stfloor.org,
	Chris Wright <chrisw@...s-sol.org>, jbeulich@...ell.com,
	peterm@...hat.com, gang.wei@...el.com, shane.wang@...el.com
Subject: Re: [RFC v4][PATCH 2/2] intel_txt: Intel(R) TXT and tboot kernel support

On Fri, 19 Jun 2009 17:05:14 +0200, Pavel Machek said:
> On Fri 2009-06-12 15:12:59, James Morris wrote:
> > On Fri, 5 Jun 2009, Joseph Cihula wrote:
> > 
> > > Linux support for Intel(R) Trusted Execution Technology.
> > 
> > > Signed-off-by:  Joseph Cihula <joseph.cihula@...el.com>
> > > Signed-off-by:  Shane Wang <shane.wang@...el.com>
> > > Signed-off-by:  Gang Wei <gang.wei@...el.com>
> > 
> > Reviewed-by: James Morris <jmorris@...ei.org>
> > 
> > There have been no comments on this since you posted it, so we might 
> > assume there are no further technical issues.
> 
> I believe the code at best useless and at worst dangerous. We don't
> merge useless code to the kernel.
> 
> What are non-evil uses of this code?

Yes, most of the uses contemplated for this are for evil DRM schemes.  On the
other hand, the code is equally useful to help make sure that mo miscreant has
snuck evil DRM (or other evil code) in behind my back.

"Somebody has screwed with this kernel image, and you're not booting what you
thought you were booting."

Seems worth it to me.

Content of type "application/pgp-signature" skipped

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ