On 24 June 2016 at 03:11, Jason Cooper wrote:
> Hi Ard,
>
> On Thu, Jun 23, 2016 at 10:05:53PM +0200, Ard Biesheuvel wrote:
>> On 23 June 2016 at 21:58, Kees Cook wrote:
>> > On Thu, Jun 23, 2016 at 12:33 PM, Jason Cooper
>> >
On 24 June 2016 at 03:11, Jason Cooper wrote:
> Hi Ard,
>
> On Thu, Jun 23, 2016 at 10:05:53PM +0200, Ard Biesheuvel wrote:
>> On 23 June 2016 at 21:58, Kees Cook wrote:
>> > On Thu, Jun 23, 2016 at 12:33 PM, Jason Cooper
>> > wrote:
>> >> On Wed, Jun 22, 2016 at 10:05:51AM -0700, Kees Cook
Hi Ard,
On Thu, Jun 23, 2016 at 10:05:53PM +0200, Ard Biesheuvel wrote:
> On 23 June 2016 at 21:58, Kees Cook wrote:
> > On Thu, Jun 23, 2016 at 12:33 PM, Jason Cooper wrote:
> >> On Wed, Jun 22, 2016 at 10:05:51AM -0700, Kees Cook wrote:
> >>> On
Hi Ard,
On Thu, Jun 23, 2016 at 10:05:53PM +0200, Ard Biesheuvel wrote:
> On 23 June 2016 at 21:58, Kees Cook wrote:
> > On Thu, Jun 23, 2016 at 12:33 PM, Jason Cooper wrote:
> >> On Wed, Jun 22, 2016 at 10:05:51AM -0700, Kees Cook wrote:
> >>> On Wed, Jun 22, 2016 at 8:59 AM, Thomas Garnier
On Thu, Jun 23, 2016 at 12:59:07PM -0700, Kees Cook wrote:
> On Thu, Jun 23, 2016 at 12:45 PM, Sandy Harris wrote:
> > Jason Cooper wrote:
> >
> >> Modern systems that receive a seed from the bootloader via the
> >> random-seed property (typically
On Thu, Jun 23, 2016 at 12:59:07PM -0700, Kees Cook wrote:
> On Thu, Jun 23, 2016 at 12:45 PM, Sandy Harris wrote:
> > Jason Cooper wrote:
> >
> >> Modern systems that receive a seed from the bootloader via the
> >> random-seed property (typically from the hw-rng) can mix both sources
> >> for
Hey Sandy,
On Thu, Jun 23, 2016 at 03:45:54PM -0400, Sandy Harris wrote:
> Jason Cooper wrote:
>
> > Modern systems that receive a seed from the bootloader via the
> > random-seed property (typically from the hw-rng) can mix both sources
> > for increased resilience.
> >
>
Hey Sandy,
On Thu, Jun 23, 2016 at 03:45:54PM -0400, Sandy Harris wrote:
> Jason Cooper wrote:
>
> > Modern systems that receive a seed from the bootloader via the
> > random-seed property (typically from the hw-rng) can mix both sources
> > for increased resilience.
> >
> > Unfortunately, I'm
On 23 June 2016 at 21:58, Kees Cook wrote:
> On Thu, Jun 23, 2016 at 12:33 PM, Jason Cooper wrote:
>> Hey Kees, Thomas,
>>
>> On Wed, Jun 22, 2016 at 10:05:51AM -0700, Kees Cook wrote:
>>> On Wed, Jun 22, 2016 at 8:59 AM, Thomas Garnier
On 23 June 2016 at 21:58, Kees Cook wrote:
> On Thu, Jun 23, 2016 at 12:33 PM, Jason Cooper wrote:
>> Hey Kees, Thomas,
>>
>> On Wed, Jun 22, 2016 at 10:05:51AM -0700, Kees Cook wrote:
>>> On Wed, Jun 22, 2016 at 8:59 AM, Thomas Garnier wrote:
>>> > On Wed, Jun 22, 2016 at 5:47 AM, Jason Cooper
On Thu, Jun 23, 2016 at 12:45 PM, Sandy Harris wrote:
> Jason Cooper wrote:
>
>> Modern systems that receive a seed from the bootloader via the
>> random-seed property (typically from the hw-rng) can mix both sources
>> for increased resilience.
>>
On Thu, Jun 23, 2016 at 12:45 PM, Sandy Harris wrote:
> Jason Cooper wrote:
>
>> Modern systems that receive a seed from the bootloader via the
>> random-seed property (typically from the hw-rng) can mix both sources
>> for increased resilience.
>>
>> Unfortunately, I'm not very familiar with
On Thu, Jun 23, 2016 at 12:33 PM, Jason Cooper wrote:
> Hey Kees, Thomas,
>
> On Wed, Jun 22, 2016 at 10:05:51AM -0700, Kees Cook wrote:
>> On Wed, Jun 22, 2016 at 8:59 AM, Thomas Garnier wrote:
>> > On Wed, Jun 22, 2016 at 5:47 AM, Jason Cooper
On Thu, Jun 23, 2016 at 12:33 PM, Jason Cooper wrote:
> Hey Kees, Thomas,
>
> On Wed, Jun 22, 2016 at 10:05:51AM -0700, Kees Cook wrote:
>> On Wed, Jun 22, 2016 at 8:59 AM, Thomas Garnier wrote:
>> > On Wed, Jun 22, 2016 at 5:47 AM, Jason Cooper wrote:
>> >> Hey Kees,
>> >>
>> >> On Tue, Jun
Jason Cooper wrote:
> Modern systems that receive a seed from the bootloader via the
> random-seed property (typically from the hw-rng) can mix both sources
> for increased resilience.
>
> Unfortunately, I'm not very familiar with the internals of x86
> bootstrapping.
Jason Cooper wrote:
> Modern systems that receive a seed from the bootloader via the
> random-seed property (typically from the hw-rng) can mix both sources
> for increased resilience.
>
> Unfortunately, I'm not very familiar with the internals of x86
> bootstrapping. Could GRUB be scripted to
Hey Kees, Thomas,
On Wed, Jun 22, 2016 at 10:05:51AM -0700, Kees Cook wrote:
> On Wed, Jun 22, 2016 at 8:59 AM, Thomas Garnier wrote:
> > On Wed, Jun 22, 2016 at 5:47 AM, Jason Cooper wrote:
> >> Hey Kees,
> >>
> >> On Tue, Jun 21, 2016 at 05:46:57PM
Hey Kees, Thomas,
On Wed, Jun 22, 2016 at 10:05:51AM -0700, Kees Cook wrote:
> On Wed, Jun 22, 2016 at 8:59 AM, Thomas Garnier wrote:
> > On Wed, Jun 22, 2016 at 5:47 AM, Jason Cooper wrote:
> >> Hey Kees,
> >>
> >> On Tue, Jun 21, 2016 at 05:46:57PM -0700, Kees Cook wrote:
> >>> Notable
On Wed, Jun 22, 2016 at 8:59 AM, Thomas Garnier wrote:
> On Wed, Jun 22, 2016 at 5:47 AM, Jason Cooper wrote:
>> Hey Kees,
>>
>> On Tue, Jun 21, 2016 at 05:46:57PM -0700, Kees Cook wrote:
>>> Notable problems that needed solving:
>> ...
>>> -
On Wed, Jun 22, 2016 at 8:59 AM, Thomas Garnier wrote:
> On Wed, Jun 22, 2016 at 5:47 AM, Jason Cooper wrote:
>> Hey Kees,
>>
>> On Tue, Jun 21, 2016 at 05:46:57PM -0700, Kees Cook wrote:
>>> Notable problems that needed solving:
>> ...
>>> - Reasonable entropy is needed early at boot before
On Wed, Jun 22, 2016 at 5:47 AM, Jason Cooper wrote:
> Hey Kees,
>
> On Tue, Jun 21, 2016 at 05:46:57PM -0700, Kees Cook wrote:
>> Notable problems that needed solving:
> ...
>> - Reasonable entropy is needed early at boot before get_random_bytes()
>>is available.
>
>
On Wed, Jun 22, 2016 at 5:47 AM, Jason Cooper wrote:
> Hey Kees,
>
> On Tue, Jun 21, 2016 at 05:46:57PM -0700, Kees Cook wrote:
>> Notable problems that needed solving:
> ...
>> - Reasonable entropy is needed early at boot before get_random_bytes()
>>is available.
>
> This series is
Hey Kees,
On Tue, Jun 21, 2016 at 05:46:57PM -0700, Kees Cook wrote:
> Notable problems that needed solving:
...
> - Reasonable entropy is needed early at boot before get_random_bytes()
>is available.
This series is targetting x86, which typically has RDRAND/RDSEED
instructions. Are you
Hey Kees,
On Tue, Jun 21, 2016 at 05:46:57PM -0700, Kees Cook wrote:
> Notable problems that needed solving:
...
> - Reasonable entropy is needed early at boot before get_random_bytes()
>is available.
This series is targetting x86, which typically has RDRAND/RDSEED
instructions. Are you
24 matches
Mail list logo