Jan Hudec wrote:
> On Thu, Apr 21, 2005 at 19:44:56 +0100, Jamie Lokier wrote:
> > Jan Hudec wrote:
> > > By the way, IIRC so far the root can access all kernel memory too via
> > > /dev/kmem. So the limiting of root's rights would have to be limited
> > > a bit more yet.
> > 
> > On some hardened systems, root is not allowed access to /dev/kmem.
> 
> That sure makes sense. Still the secret keys must either never leave
> kernel (which would need all the encryption, decryption and checking
> code in kernel), or they must be protected in userland too. Which means
> the process has to be protected against being ptraced or inspected
> through /dev/mem.

That's right.  Protecting users' private data from access by the
administrators on a multi-user system is, not surprisingly, hard....

-- Jamie
-
To unsubscribe from this list: send the line "unsubscribe linux-fsdevel" in
the body of a message to [EMAIL PROTECTED]
More majordomo info at  http://vger.kernel.org/majordomo-info.html

Reply via email to