On Tue, 8 Jul 2008, Perry E. Metzger wrote:
| Has anyone had any real-world experience with these yet? Are there
| standards for how they get the keys from the BIOS or OS? (I'm
| interested in how they deal with zeroization on sleep and such.)
|
| Most manufacturer (will) implement the TCG
Ben Laurie wrote:
OK, so you still have a PKI problem, in that you have to issue and
manage client certificates. How is this done?
One man's meat :-). (I don't necessarily view this as a problem
Ben. I've built up a career and a small business in the last 9 years
doing just that.)
Ali, Saqib wrote:
Quoting the Foxbusiness article:
Permanent Privacy (patent pending) has been verified by Peter
Schweitzer, one of Harvard's top cryptanalysts, and for the inevitable
cynics Permanent Privacy is offering $1,000,000 to anyone who can
decipher a sample of ciphertext.
I did a
I think Dan Kaminsky is on this list. Any other tidbits you can add
prior to Black Hat?
Udhay
http://www.liquidmatrix.org/blog/2008/07/08/kaminsky-breaks-dns/
Kaminsky Breaks DNS
Author: Dave Lewis
July 8, 2008 at 2:21 pm ยท Filed under Patches, Vulnerability
Well, sort of.
Today Dan
Arshad Noor [EMAIL PROTECTED] writes:
Perry E. Metzger wrote:
There are now a number of drives on the market advertising AES based
FDE in hardware, and a number of laptops available on the market that
claim to support them.
[...]
There is a debate going on on that list about the value of
I've now talked to a few people affiliated with drive companies at
this point. One of them seems to really know what he's doing. The rest
appear not to. One has even spoken to me of keying material being
protected by what are effectively one time pads and trust us, this
is our business in ways
On Wed, 09 Jul 2008 11:22:58 +0530
Udhay Shankar N [EMAIL PROTECTED] wrote:
I think Dan Kaminsky is on this list. Any other tidbits you can add
prior to Black Hat?
Udhay
http://www.liquidmatrix.org/blog/2008/07/08/kaminsky-breaks-dns/
I'm curious about the details of the attack. Paul
First off, big props to Dan for getting this problem fixed in a
responsible manner. If there were widespread real attacks first, it
would take forever to get fixes out into the field.
However, we in the security circles don't need to spread the
Kaminsky finds meme. Take a look at
However, we in the security circles don't need to spread the
Kaminsky finds meme.
Quite right. Paul Vixie mentioned it in 1995, Dan Bernstein started
distributing versions of dnscache with randomized port and sequence
numbers in 2001.
The take-away here is not that Dan didn't discover the
| ...Obviously patents could be improved by searching further across
| disciplines for prior art and by having more USPTO expertise. We're
| also seeing a dumbing down of the 'Persons Having Ordinary Skill In
| the Art' as the number of practitioners expand rapidly.
Patent law and its
Paul Hoffman wrote:
First off, big props to Dan for getting this problem fixed in a
responsible manner. If there were widespread real attacks first, it
would take forever to get fixes out into the field.
However, we in the security circles don't need to spread the Kaminsky
finds meme. Take a
On Wed, Jul 09, 2008 at 08:20:33AM -0700, Paul Hoffman wrote:
First off, big props to Dan for getting this problem fixed in a
responsible manner. If there were widespread real attacks first, it
would take forever to get fixes out into the field.
However, we in the security circles don't
On Wed, Jul 09, 2008 at 05:36:02PM +0100, Ben Laurie wrote:
Paul Hoffman wrote:
First off, big props to Dan for getting this problem fixed in a
responsible manner. If there were widespread real attacks first, it would
take forever to get fixes out into the field.
However, we in the security
Ben Laurie wrote:
Paul Hoffman wrote:
First off, big props to Dan for getting this problem fixed in a
responsible manner. If there were widespread real attacks first, it
would take forever to get fixes out into the field.
However, we in the security circles don't need to spread the Kaminsky
+ John Kemp [EMAIL PROTECTED]:
It does seem he would like an air of some mystery to exist though
until he makes his presentation about the issue at Defcon - did he,
himself, discover something new? We'll just have to wait, unless we
go play with the BIND code ourselves.
Unless he is merely
Steven M. Bellovin wrote:
On Wed, 09 Jul 2008 11:22:58 +0530
Udhay Shankar N [EMAIL PROTECTED] wrote:
I think Dan Kaminsky is on this list. Any other tidbits you can add
prior to Black Hat?
Udhay
http://www.liquidmatrix.org/blog/2008/07/08/kaminsky-breaks-dns/
I'm curious about the
The 2008 IEEE Key Management Summit (KMS) is currently seeking six panelists
to act as the voice of customers who have purchased or plan to purchase a
cryptographic key management solution.
The panels will be moderated by leading analysts Jon Oltsik of the
Enterprise Strategy Group, and Ramon
Ah, where the web is going. 8e6 Technologies sells a hardware box
that it claims does signature analysis to detect HTTP proxies and
blocks them. It can also block HTTPS proxies that do not have a
valid certificate (whatever that means), as well as do such things
as block IM, force Google and
18 matches
Mail list logo