Re: MUSCLE Disk encryption and more

2001-06-25 Thread Alex Russell
s security value > > is > > dubious to say the least, and this guy didn't seem to understand what > > a > > trust path even implied. > > > > Alex > > [EMAIL PROTECTED] > > [EMAIL PROTECTED] > > [EMAIL PROTECTED] > > > > -

Re: MUSCLE Disk encryption and more

2001-06-25 Thread Patrick Valsecchi
h a system, it's security value > is > dubious to say the least, and this guy didn't seem to understand what > a > trust path even implied. > > Alex > [EMAIL PROTECTED] > [EMAIL PROTECTED] > [EMAIL PROTECTED] > > - Original Message ----- > From: &q

Re: MUSCLE Disk encryption and more

2001-06-25 Thread Christoph Plattner
Ok, it's offtopic here, but I don't think, it is a good idea to use such policy. Why to protect such thing ?? A good policy is to setup a box and to have a model earning money on services not on the boxes or the system (linux). The user can do what ever he/she wants to do, if the user disconfigu

Re: MUSCLE Disk encryption and more

2001-06-25 Thread Dr S N Henson
Patrick Valsecchi wrote: > > > I don't have to store each signature of each bin into the smartcard. I won't > have enough RAM for that! I'll store inside each executable and library the > signed crypto hash. The kernel will check if the crypto hash is still the same > and the smartcard will just

Re: MUSCLE Disk encryption and more

2001-06-25 Thread Patrick Valsecchi
Quoting [EMAIL PROTECTED]: > On Fri, 22 Jun 2001, Jim Rees wrote: > > > Ok, so you have a bunch of executables and a table of pre-computed > CRC's. > > > > No, you have a bunch of executables, and for each you have a crypto > hash > > signed with a private key. > > Ok. > > > You could sto

Re: MUSCLE Disk encryption and more

2001-06-25 Thread Karl Katewu
eheads <[EMAIL PROTECTED]> Sent: Friday, June 22, 2001 11:17 PM Subject: Re: MUSCLE Disk encryption and more > On Fri, 22 Jun 2001, Jim Rees wrote: > > > Ok, so you have a bunch of executables and a table of pre-computed CRC's. > > > > No, you have a bunch of ex

Re: MUSCLE Disk encryption and more

2001-06-23 Thread Peter Tomlinson
built into their spec a system to control what programs it can run, they should have. Peter T Bristol UK - Original Message - From: "Jim Rees" <[EMAIL PROTECTED]> To: "Smart Muscleheads" <[EMAIL PROTECTED]> Sent: Friday, June 22, 2001 10:13 PM Subject: Re: MUS

Re: MUSCLE Disk encryption and more

2001-06-22 Thread mgraffam
On Fri, 22 Jun 2001, Jim Rees wrote: > Ok, so you have a bunch of executables and a table of pre-computed CRC's. > > No, you have a bunch of executables, and for each you have a crypto hash > signed with a private key. Ok. > You could store the public key in the secure rom, but this guy wa

Re: MUSCLE Disk encryption and more

2001-06-22 Thread Naomaru Itoi
Hi, It's still crude, but we have a paper on smartcard based secure booting: http://www.citi.umich.edu/techreports/ Boot up from secure ROM, and use a smartcard to make sure kernels and application binaries are good. -- Concentration .. Naomaru Itoi *

Re: MUSCLE Disk encryption and more

2001-06-22 Thread Jim Rees
Ok, so you have a bunch of executables and a table of pre-computed CRC's. No, you have a bunch of executables, and for each you have a crypto hash signed with a private key. You could store the public key in the secure rom, but this guy wants to use a smart card, presumably because he wants t

Re: MUSCLE Disk encryption and more

2001-06-22 Thread Patrick Valsecchi
Thanks you, this is a very good recapitulation. Even better that my first mail ;-) Quoting Jeremy Impson <[EMAIL PROTECTED]>: > On Fri, 22 Jun 2001 [EMAIL PROTECTED] wrote: > > > On Fri, 22 Jun 2001, Jim Rees wrote: > > > > > But if you really are concerned about "very skilled hackers" you >

Re: MUSCLE Disk encryption and more

2001-06-22 Thread mgraffam
On Fri, 22 Jun 2001, Patrick Valsecchi wrote: > I can sign the kernel, the executables and the libraries. The loader (lilo) can > be in the securized memory of the processor. So before it loads the kernel, it > checks the signature with the smartcard. Then I'm quit sure it's my own kernel > th

Re: MUSCLE Disk encryption and more

2001-06-22 Thread Jim Rees
Aren't CRC algorithms easy to reverse? Sorry for the sloppy terminology. Obviously this has to be a cryptographic hash, not just a crc. But I still think performance will not be a huge issue. dumaguete# ls -l /bsd -rwxr-xr-x 1 rees wheel 2172784 Jan 25 16:11 /bsd dumaguete# time md5 /bsd

Re: MUSCLE Disk encryption and more

2001-06-22 Thread Eric Murray
On Fri, Jun 22, 2001 at 10:00:35PM +0200, Patrick Valsecchi wrote: > The user will be able to change the code, that's not the matter, but it wont be > able to run it on my customer's hardware. That's the point. And I don't this it > goes against any law neither any license. > > I'm sure it does

Re: MUSCLE Disk encryption and more

2001-06-22 Thread Patrick Valsecchi
The user will be able to change the code, that's not the matter, but it wont be able to run it on my customer's hardware. That's the point. And I don't this it goes against any law neither any license. I'm sure it doesn't go against any GPL spirit. It's even possible that my source will be par

Re: MUSCLE Disk encryption and more

2001-06-22 Thread Jeremy Impson
On Fri, 22 Jun 2001 [EMAIL PROTECTED] wrote: > On Fri, 22 Jun 2001, Jim Rees wrote: > > > But if you really are concerned about "very skilled hackers" you will need > > significant hardware protection, like a processor with integrated boot code > > or an epoxy potted processor and boot rom modul

Re: MUSCLE Disk encryption and more

2001-06-22 Thread Jim Rees
I know that checking the CRC of the executable can lead to slowlyness (have to load each page of it), but I don't think I have the choice. This shouldn't be slow at all. You have to load the pages anyway, right? I hope you're not thinking about sending the entire kernel to the card, that w

Re: MUSCLE Disk encryption and more

2001-06-22 Thread Patrick Valsecchi
Hi Why not, but this solution is not solving my problem. This just provides encrypted disk. My main concern, is disallowing the user to run its own executables. For answering peoples questions, I don't want to protect this hardware against governements or very high budgeted crackers. My custo

Re: MUSCLE Disk encryption and more

2001-06-22 Thread mgraffam
On Fri, 22 Jun 2001, Jim Rees wrote: > But if you really are concerned about "very skilled hackers" you will need > significant hardware protection, like a processor with integrated boot code > or an epoxy potted processor and boot rom module. Even then you won't be > able to completely protect

Re: MUSCLE Disk encryption and more

2001-06-22 Thread Jim Rees
I don't know about the rest of it, but a former colleague of mine worked on a secure booting system using a smartcard. I don't see anything on his web page about it but you could contact him directly. http://www.citi.umich.edu/u/itoi/ But if you really are concerned about "very skilled hackers"

Re: MUSCLE Disk encryption and more

2001-06-21 Thread Alex Russell
um you've got a lot of requirements that Linux may or may not be able to meet. I think the biggest problem you're going to have is that if the user has hardware access, the game is over anyway. Really, truly, and completely over. Trusted hardware tends to combat this inability to be able to wi