Re: Cryptoloop patch for builtin default passphrase

From: Nico Augustijn
Date: Mon Oct 25 2004 - 14:05:01 EST


On Monday 25 October 2004 19:19, you wrote:
> On Mon, 25 Oct 2004 13:54:31 +0200, "Nico Augustijn." said:
> > But all that takes some searching. And the passphrase is also XOR-ed with
> > the first 32 bytes of /dev/nvram.
>
> So if something touches the first 32 bytes of NVRAM, your data evaporates?
>
> Is this considered a desirable result?
Yes. In this case it is very much a desirable result.
As this patch is meant (as far as I am concerned) for embedded systems only, I
really don't want people to muck about with the BIOS settings (primary boot
device, for instance).
-
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@xxxxxxxxxxxxxxx
More majordomo info at http://vger.kernel.org/majordomo-info.html
Please read the FAQ at http://www.tux.org/lkml/