Date: Mon, 09 Nov 2015 13:57:57 -0500 From: Valdis.Kletnieks@...edu To: kernel-hardening@...ts.openwall.com Cc: Emese Revfy <re.emese@...il.com>, Kees Cook <keescook@...omium.org>, PaX Team <pageexec@...email.hu>, Brad Spengler <spender@...ecurity.net>, Greg KH <gregkh@...uxfoundation.org>, Theodore Tso <tytso@...gle.com>, Josh Triplett <josh@...htriplett.org> Subject: Re: Re: Proposal for kernel self protection features On Mon, 09 Nov 2015 18:28:32 +0000, Jason Cooper said: > I had a proposal a while back (can't find atm, sorry) to have the > bootloader load the random-seed into RAM ... It's *easy* to come up with an API to hand the kernel 64 or 128 bits of random to kick things off. The *hard* part is finding 64 or so bits of trustable random to hand to the kernel.... Content of type "application/pgp-signature" skipped
Powered by blists - more mailing lists
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.