[121972] in cryptography@c2.net mail archive

home help back first fref pref prev next nref lref last post

Re: defending against evil in all layers of hardware and software

daemon@ATHENA.MIT.EDU (Jonathan Thornburg)
Tue Apr 29 15:24:33 2008

Date: Tue, 29 Apr 2008 18:49:30 +0100 (BST)
From: Jonathan Thornburg <J.Thornburg@soton.ac.uk>
To: =?UTF-8?Q?Ivan_Krsti=C4=87?= <krstic@solarsail.hcs.harvard.edu>
cc: John Denker <jsd@av8n.com>, Cryptography <cryptography@metzdowd.com>
In-Reply-To: <CB58419F-8611-4696-9C4E-B64F2A5BA3AC@solarsail.hcs.harvard.edu>

  This message is in MIME format.  The first part should be readable text,
  while the remaining parts are likely unreadable without MIME-aware tools.

--0-744702691-1209491370=:24967
Content-Type: TEXT/PLAIN; charset=X-UNKNOWN
Content-Transfer-Encoding: 8BIT

On Tue, 29 Apr 2008, Ivan KrstiÄ~G wrote:
> On Apr 28, 2008, at 12:58 PM, John Denker wrote:
> > Of course we should insist on an open-source boot ROM code:
> > The boot ROM should check the pgp signature of each PCI card's
> > BIOS code before letting it get control.  And then it should
> > check the pgp signature of the operating system before booting
> > it.  I don't know of any machine that actually does this
> 
> 
> The OLPC XO-1 laptop has an open-source bootloader (Open Firmware) which
> checks the operating system signature before passing control to it.

If the bootloader is running on malicious hardware I don't think that
test can be trusted. :(

-- Jonathan Thornburg (remove -animal to reply) <J.Thornburg@soton.ac-zebra.uk>
   School of Mathematics, U of Southampton, England
   "C++ is to programming as sex is to reproduction. Better ways might
    technically exist but they're not nearly as much fun." -- Nikolai Irgens


--0-744702691-1209491370=:24967--

---------------------------------------------------------------------
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to majordomo@metzdowd.com

home help back first fref pref prev next nref lref last post