Re: Cryptoloop patch for builtin default passphrase

From: Paulo Marques
Date: Mon Oct 25 2004 - 13:02:35 EST


Valdis.Kletnieks@xxxxxx wrote:
On Mon, 25 Oct 2004 13:54:31 +0200, "Nico Augustijn." said:


But all that takes some searching. And the passphrase is also XOR-ed with the
first 32 bytes of /dev/nvram.


So if something touches the first 32 bytes of NVRAM, your data evaporates?

Is this considered a desirable result?

I don't have any feelings about this patch, but it seems to me that you could always store the contents of the nvram somewhere "safe" (you could even write them down and take it to a safe deposit box in a bank :) ), and, if those contents happen to change, you could always write them again...

Just my 0.02 euros,

--
Paulo Marques - www.grupopie.com

All that is necessary for the triumph of evil is that good men do nothing.
Edmund Burke (1729 - 1797)
-
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@xxxxxxxxxxxxxxx
More majordomo info at http://vger.kernel.org/majordomo-info.html
Please read the FAQ at http://www.tux.org/lkml/