Re: TPM disk crypto

2006-10-06 Thread Travis H.
On 10/2/06, Erik Tews [EMAIL PROTECTED] wrote: Am Sonntag, den 01.10.2006, 23:42 -0500 schrieb Travis H.: Anyone have any information on how to develop TPM software? http://tpm4java.datenzone.de/ Using this lib, you need less than 10 lines of java-code for doing some simple

Re: TPM disk crypto

2006-10-06 Thread Erik Tews
Am Donnerstag, den 05.10.2006, 16:25 -0500 schrieb Travis H.: On 10/2/06, Erik Tews [EMAIL PROTECTED] wrote: Am Sonntag, den 01.10.2006, 23:42 -0500 schrieb Travis H.: Anyone have any information on how to develop TPM software? http://tpm4java.datenzone.de/ Using

Re: TPM disk crypto

2006-10-06 Thread Travis H.
On 10/5/06, Erik Tews [EMAIL PROTECTED] wrote: First, you need a system with tpm. I assume you are running linux. Then you boot your linux-kernel and an initrd using the trusted grub bootloader. Your bios will report the checksum of trusted grub to the tpm before giving control to your grub

Re: Why the exponent 3 error happened:

2006-10-06 Thread James A. Donald
-- Travis H. wrote: Actually, encoding lengths of other fields in a protocol is probably the easiest way to introduce a remotely-exploitable vulnerability (typically buffer overflow). I'm going to have to side with the no redundancy means no inconsistencies possible argument here. Oh,