On Wed, 2013-09-11 at 10:49 -0700, Andy Lutomirski wrote:
> On Wed, Sep 11, 2013 at 10:22 AM, David Safford wrote:
> >>On 09/09/2013 02:11 PM, H. Peter Anvin wrote:
>
> A TPM that has an excellent internal entropy source and is FIPS 140-2
> compliant with no bugs wha
>On 09/09/2013 02:11 PM, H. Peter Anvin wrote:
>> It recently came to my attention that there are no standards whatsoever
>> for random number generated by TPMs. In fact, there *are* TPMs where
>> random numbers are generated by an encrypted nonvolatile counter (I do
>> not know which ones); this
On Mon, 2007-04-16 at 20:20 -0400, James Morris wrote:
> On Mon, 16 Apr 2007, John Johansen wrote:
>
> > Label-based security (exemplified by SELinux, and its predecessors in
> > MLS systems) attaches security policy to the data. As the data flows
> > through the system, the label sticks to the da
On Thu, 2007-03-22 at 23:19 +, Pavel Machek wrote:
> > There are some papers and related userspace code at
> >http://www.research.ibm.com/gsal/tcpa
> > which describe the architecture in more detail, but basically this
> > integrity provider is designed to complement mandatory access contr
On Sun, 2007-03-25 at 12:13 +, Pavel Machek wrote:
> > > + The Extended Verification Module is an integrity provider.
> > > + An extensible set of extended attributes, as defined in
> > > + /etc/evm.conf, are HMAC protected against modification
> > > + using the TPM's KERNEL ROOT KEY, i
5 matches
Mail list logo