On Thu, Sep 04, 2008 at 11:40:32PM +0200, phcoder wrote:
> Robert Millan wrote:
> > On Wed, Sep 03, 2008 at 08:49:14PM +0300, Vesa Jääskeläinen wrote:
> >> Possibilites are there, but basically they are limited to something like:
> >>
> >> (ata0) (pci-X-Y-Z:ata0) (usb-X-Y:scsi0) (pci-X-Y-Z:scsi0)
> > 
> > I think this is overkill, and doesn't really address the root of the 
> > problem.
> > 
> > The real security problem here is whether the executable code you're 
> > loading is
> > trusted, NOT where you load the code from.
> If the code is loaded from the same place as we do then we can trust it
> (if attacker could modify the code, he could also modify us)

Right.  I was assuming you mean when code is loaded from different places.
Having untrusted code perform the verification of other untrusted code is
useless, of course.

-- 
Robert Millan

  The DRM opt-in fallacy: "Your data belongs to us. We will decide when (and
  how) you may access your data; but nobody's threatening your freedom: we
  still allow you to remove your data and not access it at all."


_______________________________________________
Grub-devel mailing list
Grub-devel@gnu.org
http://lists.gnu.org/mailman/listinfo/grub-devel

Reply via email to