Re: Cryptoloop patch for builtin default passphrase

From: Paulo Marques
Date: Mon Oct 25 2004 - 13:31:26 EST


Valdis.Kletnieks@xxxxxx wrote:
On Mon, 25 Oct 2004 18:33:43 BST, Paulo Marques said:


I don't have any feelings about this patch, but it seems to me that you could always store the contents of the nvram somewhere "safe" (you could even write them down and take it to a safe deposit box in a bank :) ), and, if those contents happen to change, you could always write them again...

I really didn't want to pursue this further, but...

That's assuming that your machine will even *boot* correctly and cleanly if the
contents of the NVRAM are put back.

You can always boot with a rescue CD or something, assuming that you don't have a stupid file system (I think there is none in Linux) that mounts even with the wrong magic number and trashes the block device contents.

(why would you need confidential information to boot in the first place?)

And if you're doing the "write it down and type it in again" thing, you might
as well just use a passphrase, as it's defeating the whole concept of
using /dev/nvram to xor against....

No it is not. You would just type in again *if* the contents of nvram got lost which shouldn't happen in the first place (or at least happen rarely).

This is a "just in case" scenario, not a everytime scenario liake the passphrase approach.

As I said before, I have no strong feelings about this patch, I just don't like to see things defeated over false arguments...

--
Paulo Marques - www.grupopie.com

All that is necessary for the triumph of evil is that good men do nothing.
Edmund Burke (1729 - 1797)
-
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@xxxxxxxxxxxxxxx
More majordomo info at http://vger.kernel.org/majordomo-info.html
Please read the FAQ at http://www.tux.org/lkml/