Re: FreeBSD 5/6/7 kernel emulator for NetBSD 2.x

2005-10-27 Thread Steven M. Bellovin
any i-nodes but no actual files. (Well, I've seen glitches on ancient systems where /dev/null got turned into a regular file, leading to amusing messages about "/dev/null: no space left on device"...) --Steven M. Bellovin, h

Re: FUD about CGD and GBDE

2005-03-06 Thread Steven M. Bellovin
ventually, but there's nothing in shape to release right now. It's proof-of-concept C, a few awk scripts, and a bunch of hand-typed awk and gnuplot. --Prof. Steven M. Bellovin, http://www.cs.columbia.edu/~smb ___ freeb

Re: FUD about CGD and GBDE

2005-03-06 Thread Steven M. Bellovin
te, I realized that my own cgd "partition" (via vnd) was created from /dev/zero instead of /dev/urandom; the result is that the entropy of the file itself reveals almost exactly how much of the cgd partition is in use. I'll have to correct that) --Prof. Steve

Re: FUD about CGD and GBDE

2005-03-04 Thread Steven M. Bellovin
In message <[EMAIL PROTECTED]>, Thor Lancelot Simon writes: >On Thu, Mar 03, 2005 at 10:15:55PM +0100, Poul-Henning Kamp wrote: >> >> And if CGD is _so_ officially approved as you say, then I can not >> for the life of me understand how it can use the same key to generate >> the IV and perform the

Re: FUD about CGD and GBDE

2005-03-04 Thread Steven M. Bellovin
ong a cipher is. In that vein, I'll note that 256-bit AES is approved for Top Secret traffic. > >Shortly after AES was gold-plated the earlier mentioned attack >method where it is decomposed into a massive number of equations >was presented. >

Re: FUD about CGD and GBDE

2005-03-04 Thread Steven M. Bellovin
In message <[EMAIL PROTECTED]>, Thor Lancelot Simon writes: >On Thu, Mar 03, 2005 at 05:31:34PM +0100, Poul-Henning Kamp wrote: >> In message <[EMAIL PROTECTED]>, "ALeine" writes: >> >> >Not necessarily, if one were to implement the ideas I proposed >> >I believe the performance could be kept at t

Re: RFC: backporting GEOM to the 4.x branch

2005-03-02 Thread Steven M. Bellovin
here is a very real threat not addressed here: detecting unauthorized changes to an encrypted disk. For a very elegant solution, see http://www.isoc.org/isoc/conferences/ndss/05/proceedings/papers/storageint.pdf --Prof. Steven M. Bellovin, http://www.cs.columbia.edu/~smb __