Re: Undocumented Bypass in PGP Whole Disk Encryption

2007-10-06 Thread Peter Gutmann
Victor Duchovni [EMAIL PROTECTED] writes:
On Thu, Oct 04, 2007 at 02:37:21PM -0500, [EMAIL PROTECTED] wrote:
 http://it.slashdot.org/article.pl?sid=07/10/04/1639224from=rss

 Interesting quote:

 Jon Callas, CTO and CSO of PGP Corp., responded that this [previously
 undocumented] feature was required by unnamed customers and that
 competing products have similar functionality.

The article is sensational nonsense. The quote is right on the money,
businesses require disk encryption companies to support one time unprotected
reboot (enabled securely before reboot) to support automated rebuilds.

Specifically, the capability exists to allow a one-off unattended reboot of
servers, i.e. you tell the program that at the next reboot, it should
automount the drive without stopping to ask for the password so that the
reboot can continue.  Without this, it would be impossible to run servers with
encrypted drives.  The mysterious unnamed customers was a misrepresented
reference to sysadmins who needed the capability to run their machines.

Nothing to see here, move along, move along.

Peter.

-
The Cryptography Mailing List
Unsubscribe by sending unsubscribe cryptography to [EMAIL PROTECTED]


Undocumented Bypass in PGP Whole Disk Encryption

2007-10-05 Thread travis+ml-cryptography
http://it.slashdot.org/article.pl?sid=07/10/04/1639224from=rss

Interesting quote:

Jon Callas, CTO and CSO of PGP Corp., responded that this [previously
undocumented] feature was required by unnamed customers and that
competing products have similar functionality.
-- 
URL:http://www.subspacefield.org/~travis/ Tat Tvam Asi
For a good time on my UBE blacklist, email [EMAIL PROTECTED]


pgpUavsYRK20D.pgp
Description: PGP signature