[121972] in cryptography@c2.net mail archive
Re: defending against evil in all layers of hardware and software
daemon@ATHENA.MIT.EDU (Jonathan Thornburg)
Tue Apr 29 15:24:33 2008
Date: Tue, 29 Apr 2008 18:49:30 +0100 (BST)
From: Jonathan Thornburg <J.Thornburg@soton.ac.uk>
To: =?UTF-8?Q?Ivan_Krsti=C4=87?= <krstic@solarsail.hcs.harvard.edu>
cc: John Denker <jsd@av8n.com>, Cryptography <cryptography@metzdowd.com>
In-Reply-To: <CB58419F-8611-4696-9C4E-B64F2A5BA3AC@solarsail.hcs.harvard.edu>
This message is in MIME format. The first part should be readable text,
while the remaining parts are likely unreadable without MIME-aware tools.
--0-744702691-1209491370=:24967
Content-Type: TEXT/PLAIN; charset=X-UNKNOWN
Content-Transfer-Encoding: 8BIT
On Tue, 29 Apr 2008, Ivan KrstiÄ~G wrote:
> On Apr 28, 2008, at 12:58 PM, John Denker wrote:
> > Of course we should insist on an open-source boot ROM code:
> > The boot ROM should check the pgp signature of each PCI card's
> > BIOS code before letting it get control. And then it should
> > check the pgp signature of the operating system before booting
> > it. I don't know of any machine that actually does this
>
>
> The OLPC XO-1 laptop has an open-source bootloader (Open Firmware) which
> checks the operating system signature before passing control to it.
If the bootloader is running on malicious hardware I don't think that
test can be trusted. :(
-- Jonathan Thornburg (remove -animal to reply) <J.Thornburg@soton.ac-zebra.uk>
School of Mathematics, U of Southampton, England
"C++ is to programming as sex is to reproduction. Better ways might
technically exist but they're not nearly as much fun." -- Nikolai Irgens
--0-744702691-1209491370=:24967--
---------------------------------------------------------------------
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to majordomo@metzdowd.com