On Thu 2011-05-26 15:49:07, Mimi Zohar wrote: > > > Whether or not the phone is rooted, IMA-Appraisal, EVM, and > > > the Digital Signature Extensions help protect against remote > > > software attacks, and offline hardware attacks on individual > > > files, but not against rooting itself. > > > > As far as I can tell, file signatures only prevent "offline hardware > > attacks"; that is user trying to "attack" (== root) his own computer. > > Since when is my being able to detect and prevent unauthorized/malicious > files on my own system (eg. device - VM) from being read/executed deemed > evil?! Are you suggesting that we're better off not knowing the Well, unauthorized files should not get onto your system in the first place -- and the kernel can do that already, see for example the immutable bit. Only added bit of prevention seems to be "if someone takes the disk out and modifies the filesystem offline". Normally, you protect against that by not giving your disk to strangers. (And file signatures are useless because the stranger can replace your kernel, too). > integrity or authenticity of a file? I suggest you read Dave's > Integrity Overview whitepaper? I suggest you explain the patchset in the emails, then? Everyone here seems to be confused... Attack it protects against, and what kind of hardware is needed for the protection to be effective? Because AFAICT, file signatures, as proposed, are only useful for locking down my cellphone against myself. (That's -- evil). Pavel -- (english) http://www.livejournal.com/~pavelmachek (cesky, pictures) http://atrey.karlin.mff.cuni.cz/~pavel/picture/horses/blog.html -- To unsubscribe from this list: send the line "unsubscribe linux-fsdevel" in the body of a message to majordomo@xxxxxxxxxxxxxxx More majordomo info at http://vger.kernel.org/majordomo-info.html