On Wednesday 06 Jun 2012 20:50:38 Michael Mol wrote:
On Wed, Jun 6, 2012 at 3:40 PM, Mick michaelkintz...@gmail.com wrote:
[snip]
This is my CPU, a first generation i7:
cat /proc/cpuinfo
processor : 0
vendor_id : GenuineIntel
cpu family : 6
model :
On 7 June 2012, at 00:50, William Kenworthy wrote:
...
I dont mean cpu power management, I meant under the kernel config option
which you may not have enabled. As for the Dell iDREC, google it.
This stuff is old in enterprise equipment, and I suspect not widely
used but it is out there.
On Wednesday 06 Jun 2012 02:14:45 Bill Kenworthy wrote:
On Tue, 2012-06-05 at 10:21 -0400, Michael Mol wrote:
On Tue, Jun 5, 2012 at 8:52 AM, Mick michaelkintz...@gmail.com wrote:
On Monday 04 Jun 2012 13:57:11 Michael Mol wrote:
On Mon, Jun 4, 2012 at 8:48 AM, Mick
On Wed, Jun 6, 2012 at 3:40 PM, Mick michaelkintz...@gmail.com wrote:
[snip]
This is my CPU, a first generation i7:
cat /proc/cpuinfo
processor : 0
vendor_id : GenuineIntel
cpu family : 6
model : 30
model name : Intel(R) Core(TM) i7 CPU Q 720 @
power management:
You note that power management: above is empty.
grep-ping the /proc tree for remoteaccess does not bring up anything.
I dont mean cpu power management, I meant under the kernel config option
which you may not have enabled. As for the Dell iDREC, google it.
This stuff is
On Mon, Jun 04, 2012 at 10:34:58AM -0400, Michael Mol wrote
On Mon, Jun 4, 2012 at 9:33 AM, BRM bm_witn...@yahoo.com wrote:
We'll see if SecureBoot actually even makes it to market; if it
does, expect some Class Action lawsuits to occur.
We'll see. Don't forget _you can turn the thing
On Monday 04 Jun 2012 13:57:11 Michael Mol wrote:
On Mon, Jun 4, 2012 at 8:48 AM, Mick michaelkintz...@gmail.com wrote:
On Saturday 02 Jun 2012 23:50:58 pk wrote:
[snip]
I'm putting on my tinfoil hat now and I'm going to pretend it's
raining... :-/
Can I please join you if you have
On Tue, Jun 5, 2012 at 8:52 AM, Mick michaelkintz...@gmail.com wrote:
On Monday 04 Jun 2012 13:57:11 Michael Mol wrote:
On Mon, Jun 4, 2012 at 8:48 AM, Mick michaelkintz...@gmail.com wrote:
On Saturday 02 Jun 2012 23:50:58 pk wrote:
[snip]
I'm putting on my tinfoil hat now and I'm going to
On Tue, 2012-06-05 at 10:21 -0400, Michael Mol wrote:
On Tue, Jun 5, 2012 at 8:52 AM, Mick michaelkintz...@gmail.com wrote:
On Monday 04 Jun 2012 13:57:11 Michael Mol wrote:
On Mon, Jun 4, 2012 at 8:48 AM, Mick michaelkintz...@gmail.com wrote:
On Saturday 02 Jun 2012 23:50:58 pk wrote:
On Saturday 02 Jun 2012 23:50:58 pk wrote:
On 2012-06-02 22:10, Michael Mol wrote:
I expect the chief mechanism is at the manufacturer's end; blacklisted
keys get included on shipment.
Makes sense.
It's also probable that the OS kernel can tell the UEFI BIOS about new
keys to
On Mon, Jun 4, 2012 at 8:48 AM, Mick michaelkintz...@gmail.com wrote:
On Saturday 02 Jun 2012 23:50:58 pk wrote:
[snip]
I'm putting on my tinfoil hat now and I'm going to pretend it's
raining... :-/
Can I please join you if you have a spare hat?
On a 3 year old Dell laptop manufactured by
From: Michael Mol mike...@gmail.com
On Sat, Jun 2, 2012 at 10:04 PM, BRM bm_witn...@yahoo.com wrote:
From: Michael Mol mike...@gmail.com
[snip]
In theory that's how key signing systems are suppose to work.
In practice, they rarely implement the blacklists as they are (i) hard to
maintain,
On Mon, Jun 4, 2012 at 9:33 AM, BRM bm_witn...@yahoo.com wrote:
From: Michael Mol mike...@gmail.com
On Sat, Jun 2, 2012 at 10:04 PM, BRM bm_witn...@yahoo.com wrote:
From: Michael Mol mike...@gmail.com
[snip]
In theory that's how key signing systems are suppose to work.
In practice, they
On 2012-06-04 14:48, Mick wrote:
Can I please join you if you have a spare hat?
Sure, got lots of (virtual) hats... here's one: ^ (may be a bit small) ;-)
On a 3 year old Dell laptop manufactured by the famous and well
known Winbond Electronics /sarcasm I see this under lshw:
From: Michael Mol mike...@gmail.com
On Mon, Jun 4, 2012 at 9:33 AM, BRM bm_witn...@yahoo.com wrote:
From: Michael Mol mike...@gmail.com
On Sat, Jun 2, 2012 at 10:04 PM, BRM bm_witn...@yahoo.com wrote:
From: Michael Mol mike...@gmail.com
[snip]
In theory that's how key signing systems are
On Mon, Jun 4, 2012 at 5:13 PM, BRM bm_witn...@yahoo.com wrote:
From: Michael Mol mike...@gmail.com
On Mon, Jun 4, 2012 at 9:33 AM, BRM bm_witn...@yahoo.com wrote:
From: Michael Mol mike...@gmail.com
On Sat, Jun 2, 2012 at 10:04 PM, BRM bm_witn...@yahoo.com wrote:
From: Michael Mol
On Mon, 2012-06-04 at 10:34 -0400, Michael Mol wrote:
On Mon, Jun 4, 2012 at 9:33 AM, BRM bm_witn...@yahoo.com wrote:
From: Michael Mol mike...@gmail.com
On Sat, Jun 2, 2012 at 10:04 PM, BRM bm_witn...@yahoo.com wrote:
From: Michael Mol mike...@gmail.com
[snip]
In theory that's how key
On Sat, Jun 02, 2012 at 07:36:51PM -0400, Michael Mol wrote
The BIOS will only load a signed bootloader. The signed bootloader
will only load a signed kernel.
OK, so I sign LILO. What code is in there that prevents LILO from
loading whatever kernel I've compiled?
The signed kernel
Am 03.06.2012 08:57, schrieb Walter Dnes:
On Sat, Jun 02, 2012 at 07:36:51PM -0400, Michael Mol wrote
The BIOS will only load a signed bootloader. The signed bootloader
will only load a signed kernel.
OK, so I sign LILO. What code is in there that prevents LILO from
loading whatever
Am 02.06.2012 04:26, schrieb William Kenworthy:
http://boingboing.net/2012/05/31/lockdown-freeopen-os-maker-p.html
and something I had not considered with the whole idea was even bootable
cd's and usb keys for rescue will need the same privileges ...
BillK
I find this article
On 2012-06-02 09:43, Florian Philipp wrote:
You don't have to be blessed. You could call your distribution
BallmerSucks and still get a certificate. You just have to
register, authenticate and pay the fee. Anything else would earn
them an antitrust law suite they wouldn't forget.
... or
On Sat, Jun 2, 2012 at 3:43 AM, Florian Philipp li...@binarywings.net wrote:
Am 02.06.2012 04:26, schrieb William Kenworthy:
http://boingboing.net/2012/05/31/lockdown-freeopen-os-maker-p.html
and something I had not considered with the whole idea was even bootable
cd's and usb keys for rescue
Am 02.06.2012 15:00, schrieb Michael Mol:
On Sat, Jun 2, 2012 at 3:43 AM, Florian Philipp li...@binarywings.net wrote:
Am 02.06.2012 04:26, schrieb William Kenworthy:
http://boingboing.net/2012/05/31/lockdown-freeopen-os-maker-p.html
and something I had not considered with the whole idea was
On 2012-06-02 15:12, Florian Philipp wrote:
According to [1] it is SHA-256 and RSA-2048. If I understand it
correctly, there are means to blacklist compromised keys. That's
why
Just curious, how is a compromised key supposed to be blacklisted?
Does the bios contact Microsoft, or is it
On Sat, Jun 2, 2012 at 3:51 PM, pk pete...@coolmail.se wrote:
On 2012-06-02 15:12, Florian Philipp wrote:
According to [1] it is SHA-256 and RSA-2048. If I understand it
correctly, there are means to blacklist compromised keys. That's
why
Just curious, how is a compromised key supposed to
On 2012-06-02 22:10, Michael Mol wrote:
I expect the chief mechanism is at the manufacturer's end; blacklisted
keys get included on shipment.
Makes sense.
It's also probable that the OS kernel can tell the UEFI BIOS about new
keys to blacklist. I expect that'll be a recurring thing in the
On Sat, Jun 2, 2012 at 6:50 PM, pk pete...@coolmail.se wrote:
On 2012-06-02 22:10, Michael Mol wrote:
[snip]
It's also probable that the OS kernel can tell the UEFI BIOS about new
keys to blacklist. I expect that'll be a recurring thing in the
Monthly batch of security updates Microsoft puts
Am 03.06.2012 01:36, schrieb Michael Mol:
On Sat, Jun 2, 2012 at 6:50 PM, pk pete...@coolmail.se wrote:
On 2012-06-02 22:10, Michael Mol wrote:
[snip]
[...]
The BIOS will only load a signed bootloader. The signed bootloader
will only load a signed kernel. The signed kernel will...do
On Sat, Jun 2, 2012 at 8:35 PM, Florian Philipp li...@binarywings.net wrote:
Am 03.06.2012 01:36, schrieb Michael Mol:
On Sat, Jun 2, 2012 at 6:50 PM, pk pete...@coolmail.se wrote:
On 2012-06-02 22:10, Michael Mol wrote:
[snip]
[...]
The BIOS will only load a signed bootloader. The signed
From: Michael Mol mike...@gmail.com
On Sat, Jun 2, 2012 at 8:35 PM, Florian Philipp li...@binarywings.net
wrote:
Am 03.06.2012 01:36, schrieb Michael Mol:
On Sat, Jun 2, 2012 at 6:50 PM, pk pete...@coolmail.se wrote:
On 2012-06-02 22:10, Michael Mol wrote:
[snip]
[...]
The
On Sat, Jun 2, 2012 at 10:04 PM, BRM bm_witn...@yahoo.com wrote:
From: Michael Mol mike...@gmail.com
[snip]
In theory that's how key signing systems are suppose to work.
In practice, they rarely implement the blacklists as they are (i) hard to
maintain,
and (ii) hard to distribute in an
http://boingboing.net/2012/05/31/lockdown-freeopen-os-maker-p.html
and something I had not considered with the whole idea was even bootable
cd's and usb keys for rescue will need the same privileges ...
BillK
32 matches
Mail list logo