On Wed, 2010-03-31 at 16:43 -0400, Tom "spot" Callaway wrote:

> I'm of the opinion that we shouldn't be enabling "dead code" chunks at
> random, especially not in situations like this where the primary use is
> to encourage vendor utilization of closed source binary blobs or
> trusting a hardware vendor in matters of encryption.

I'm... slightly uncomfortable with this line of argument.

I have a little trouble distinguishing the TXT use case from hardware
passwords on hard drives.  It's an ATA feature; hdparm has support for
it.  It depends on an implementation that's buried in the drive's
firmware, and you'd hope a competent vendor would have some quantity of
encryption involved with it to defeat obvious physical attacks.  Normal
people never use it, but we've enabled them to do so, and they get to
keep both pieces.

Or another analogy: AES-NI processors almost certainly have some amount
of it implemented in microcode.  Should we refuse to upload microcode
updates for them?

I think it's a goofy feature, and I think anyone who actually trusts
Intel's measurement firmware's resistance to attack is out of their
mind.  But I have difficulty coming up with a dogmatic argument against
it.

- ajax
_______________________________________________
kernel mailing list
kernel@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/kernel

Reply via email to