Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1755411AbXFUPTR (ORCPT ); Thu, 21 Jun 2007 11:19:17 -0400 Received: (majordomo@vger.kernel.org) by vger.kernel.org id S1751159AbXFUPTI (ORCPT ); Thu, 21 Jun 2007 11:19:08 -0400 Received: from gateway12.iders.ca ([206.45.72.61]:57241 "EHLO koko.iders.ca" rhost-flags-OK-FAIL-OK-OK) by vger.kernel.org with ESMTP id S1751370AbXFUPTH (ORCPT ); Thu, 21 Jun 2007 11:19:07 -0400 Message-ID: <467A96DC.1020906@iders.ca> Date: Thu, 21 Jun 2007 10:18:52 -0500 From: Andrew McKay User-Agent: Thunderbird 1.5.0.9 (X11/20061219) MIME-Version: 1.0 To: david@lang.hm CC: Alexandre Oliva , Alan Cox , Linus Torvalds , Al Viro , Bernd Schmidt , Ingo Molnar , Daniel Hazelton , Greg KH , debian developer , Tarkan Erimer , linux-kernel@vger.kernel.org, Andrew Morton Subject: Re: Dual-Licensing Linux Kernel with GPL V2 and GPL V3 References: <4673CA7C.5040207@t-online.de> <20070616181902.GB21478@ftp.linux.org.uk> <4679557C.5080907@iders.ca> <20070620175627.319a6c55@the-village.bc.nu> <46797C52.4020907@iders.ca> In-Reply-To: Content-Type: text/plain; charset=ISO-8859-1; format=flowed Content-Transfer-Encoding: 7bit Sender: linux-kernel-owner@vger.kernel.org X-Mailing-List: linux-kernel@vger.kernel.org Content-Length: 1146 Lines: 29 david@lang.hm wrote: > On Thu, 21 Jun 2007, Alexandre Oliva wrote: > >> On Jun 21, 2007, david@lang.hm wrote: >> >>> how exactly can they prevent a system that's been tampered with from >>> accessing their network? >> >> By denying access to their servers? By not granting whatever is >> needed to initiate network sessions? >> >> And note, "it's been tampered with" is not necessarily enough of a >> reason to cut someone off, it has to meet these requirements: > > how can the server tell if it's been tampered with? > I agree with this statement. Imagine a proprietary private network where a device has been modified to run in an invisible promiscuous mode. The device looks as if it isn't doing anything wrong, but is forwarding the network out another interface. The only way to prevent that type of attack is to not allow unauthorized signed Kernels onto that network. Andrew McKay - To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to majordomo@vger.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at http://www.tux.org/lkml/