Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1758944AbYJISU0 (ORCPT ); Thu, 9 Oct 2008 14:20:26 -0400 Received: (majordomo@vger.kernel.org) by vger.kernel.org id S1753793AbYJISUN (ORCPT ); Thu, 9 Oct 2008 14:20:13 -0400 Received: from gprs189-60.eurotel.cz ([160.218.189.60]:47486 "EHLO gprs189-60.eurotel.cz" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1753477AbYJISUL (ORCPT ); Thu, 9 Oct 2008 14:20:11 -0400 Date: Thu, 9 Oct 2008 20:21:49 +0200 From: Pavel Machek To: Chris Wright Cc: "Cihula, Joseph" , linux-kernel@vger.kernel.org, "Wang, Shane" , "Wei, Gang" , "Van De Ven, Arjan" , "Mallick, Asit K" , "Nakajima, Jun" , Chris Wright , Jan Beulich , mingo@elte.hu, tytso@mit.edu Subject: Re: [RFC][PATCH 0a/3] TXT: Intel(R) Trusted Execution Technology support for Linux - Overview Message-ID: <20081009182149.GE12507@elf.ucw.cz> References: <20081009125311.GD1623@ucw.cz> <20081009174427.GB6912@sequoia.sous-sol.org> <20081009175938.GA12507@elf.ucw.cz> <20081009181451.GD6912@sequoia.sous-sol.org> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <20081009181451.GD6912@sequoia.sous-sol.org> X-Warning: Reading this can be dangerous to your mental health. User-Agent: Mutt/1.5.18 (2008-05-17) Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Content-Length: 1366 Lines: 31 On Thu 2008-10-09 11:14:51, Chris Wright wrote: > * Pavel Machek (pavel@suse.cz) wrote: > > I have never used trusted boot and I'm not sure I want to. Why would I > > want to do that? > > So that you can reason that you've booted kernel/initrd that you wanted > to (and have established a root of trust for follow-on, like Joe's IMA > example), and in the case that you didn't (say bluepill), you have a > policy in place to handle it. So like... instead of booting into rootkit it now will not boot at all? > > You exit/reenter the trusted mode accross sleep... so any guarantees > > "trusted" mode does are void, right? > > You exit from kernel to tboot on any shutdown, which handles the proper > teardown of the measured env (meaning you also come back on via tboot). > So things like saving tpm state, scrubbing secrets from memory, etc. Aha, so instead sleep mode is useless because I'll have to remount all the crypto filesystems and restart all the apps... Pavel -- (english) http://www.livejournal.com/~pavelmachek (cesky, pictures) http://atrey.karlin.mff.cuni.cz/~pavel/picture/horses/blog.html -- To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to majordomo@vger.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at http://www.tux.org/lkml/