Re: loop-AES supported ciphers

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



On Thu, Feb 28, 2002 at 05:23:12AM -0800, IT3 Stuart Blake Tener, USNR-R wrote:

> issues, the first being it is terribly difficult (at least it was for
> me), to try to use it on any kernel I choose. Loop-aes seems not to
> stick you with this issue, and that (to me) is a big gain. 

You've got a big problem anyway. With the updated binutils you can't
even compile the old kernels; you have to downgrade it to build them.

btw Herbert, have you confirmed your patches against new kernels and
with the latest binutils? I've noticed some problems with new binutils
and patched new kernels, but I don't know which patch did it or whether
it was some feature I turned on particular to those kernels. 

> The i-patch,
> will one day have a big advantage when it is inclusive to all kernels by
> default (if accepted by Linus one day), but prior to that, it is very
> hard to justify all the effort (for an individual) to keep it working
> with different kernels, too much trouble (if you ask me). 

Any kernel patch will have to be modified to keep up with the changes
in the kernel because they are part of the kernel. Modules can "often"
get away with changing only on major releases when the API changes.

However modules do not provide a general service, only a particular
one. You are stuck with that problem unless you move the API into
the kernel proper, and once you do so you are back to chasing the
latest releases.

> 	Secondly, I must tell you I do not agree with this idea of
> "known bugs", if someone (or a corporation, like SuSE) knows there is a
> "known bug", or an imperfect implementation (i.e. with blowfish), they
> have a responsibility to fix it, and offer a transition path to correct
> it.

This is all volunteer time; people give their time for free and have to
fit this in with making a living and family and friends. And besides
that, every software system (from honest vendors at least) has indeed
kept lists of known bugs. They are usually fixed in future releases.
This was the case way back when I worked with mainframe OS's.
 
> 	Having a crypto API within Linux is not only a necessity in the
> future, but also downright in demand. Once this is done, and a standard
> for crypto is built into Linux, we will be on a different page.

It is due to American regulations that it did not happen. Things have
changed and the legal opinions seem to be drifting in the direction
of saying it is safe to include encryption code. 

For example, Debian has just decided to fold many important crypto
apps into the main servers instead of isolating them in the nonUS ones.
 
> 	I to this day do not understand why Linux has not (at minimum)
> been designed to have standard crypto API calls in it, which in the
> kernel could be dummy calls, which only would work if someone
> independently compiled and loaded modules not otherwise part of the
> kernel, in order to keep the kernel in its current world-exportable
> mode, but allow for standardization of crypto calls.

Because the government was actively going after people who did this.
I could dig and give you at least three examples of programs with
hooks that got directly threatened. One of those was the original
university predecessor to Netscape. It had built in crypto hooks
in the code. They were forced to remove them.
 
-- 
------------------------------------------------------
    Nuke bin Laden:           Dale Amon, CEO/MD
  improve the global          Islandone Society
     gene pool.               www.islandone.org
------------------------------------------------------
-
Linux-crypto:  cryptography in and on the Linux system
Archive:       http://mail.nl.linux.org/linux-crypto/



[Index of Archives]     [Kernel]     [Linux Crypto]     [Gnu Crypto]     [Gnu Classpath]     [Netfilter]     [Bugtraq]
  Powered by Linux