Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <13041.1447095477@turing-police.cc.vt.edu>
Date: Mon, 09 Nov 2015 13:57:57 -0500
From: Valdis.Kletnieks@...edu
To: kernel-hardening@...ts.openwall.com
Cc: Emese Revfy <re.emese@...il.com>, Kees Cook <keescook@...omium.org>,
        PaX Team <pageexec@...email.hu>,
        Brad Spengler <spender@...ecurity.net>,
        Greg KH <gregkh@...uxfoundation.org>, Theodore Tso <tytso@...gle.com>,
        Josh Triplett <josh@...htriplett.org>
Subject: Re: Re: Proposal for kernel self protection features

On Mon, 09 Nov 2015 18:28:32 +0000, Jason Cooper said:
> I had a proposal a while back (can't find atm, sorry) to have the
> bootloader load the random-seed into RAM ...

It's *easy* to come up with an API to hand the kernel 64 or 128 bits of
random to kick things off.

The *hard* part is finding 64 or so bits of trustable random to hand to
the kernel....


Content of type "application/pgp-signature" skipped

Powered by blists - more mailing lists

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.