1 |
On Friday 26 March 2004 23:47, Robin H. Johnson wrote: |
2 |
> On Fri, Mar 26, 2004 at 10:58:43PM +0200, Sami N??t?nen wrote: |
3 |
> > The master keys could be kept totally outside of the net too so |
4 |
> > only way to compromise those is to get physical access. Simple |
5 |
> > script that automatically generates a bunch of new keys when an USB |
6 |
> > mem card is inserted is pretty easy to make. And because the |
7 |
> > computer that would do this is in no danger to be exploited through |
8 |
> > network it really doesn't need to be updated. And if one gets |
9 |
> > physical access to the machine he/she can also get physical access |
10 |
> > to the user so it doesn't matter. |
11 |
> |
12 |
> Nope, all I'd have to do is crack the machine that it gets inserted |
13 |
> into, and leave a trojan behind that sits waiting for the mem card to |
14 |
> be inserted. |
15 |
|
16 |
To do what? |
17 |
|
18 |
The master key will not be present there. |
19 |
And if you don't provide those keys that are in the card the keys you |
20 |
make with the trojaned machine can't be validated with the master |
21 |
public key. |
22 |
|
23 |
-- |
24 |
gentoo-dev@g.o mailing list |