[prev in list] [next in list] [prev in thread] [next in thread]
List: linux-security-module
Subject: Re: [TrouSerS-tech] [Ksummit-discuss] TPM MiniSummit @ LinuxCon Europe
From: Jarkko Sakkinen <jarkko.sakkinen () linux ! intel ! com>
Date: 2014-10-24 12:51:29
Message-ID: 20141024125129.GA14916 () intel ! com
[Download RAW message or body]
On Thu, Oct 23, 2014 at 02:45:28PM -0700, Mike Pontillo wrote:
> On 10/7/14, 10:58 AM, "Andy Lutomirski" <luto@amacapital.net> wrote:
>
>
> >Trousers is a daemon, not a library, and it's really quite scary.
> >
> >Admittedly, my information may be a bit out of date, but trousers
> >contains way too much code (it has layers in the server!), it has
> >parsers and serializers of questionable safety (I found one critical
> >bug *by accident* a couple years ago), it listens on a TCP socket
> >(this should really be a UNIX socket under /run), it's heavy-weight,
> >and it does far more than necessary (all it needs to do is context
> >switching).
> >
> >Also, Trousers is quite unfriendly to non-Trousers-using programs
> >(e.g. chapsd/trunks).
> >
> >If the kernel helped with context switching, then user programs that
> >actually want Trousers' functionality could run their own copies.
> >
> >--Andy
>
> I noticed that Google's fork of TrouSerS (available here) already uses
> UNIX sockets. [1]
>
> However, (according to our lawyer) we aren't able to use this code,
> since it was forked before the license was changed to BSD. It's unclear,
> also, if it's okay to merge them into the TrouSerS source, since Google
> released the changes under the CPL already.
>
> Would it be possible for this code to be integrated into mainline
> TrouSerS? From what I understand, the Google contributor agreement [2]
> allows Google to relicense those changes, if desired. (presumably, with
> the agreement of the TrouSerS contributors - but apparently it has already
> been decided that a BSD license is okay; is this retroactive?)
In the long run you still want a broker to the kernel because there is
no other way to resolve race between kernel and user space when the TPM is
used.
> Regards,
> Mike
/Jarkko
--
To unsubscribe from this list: send the line "unsubscribe linux-security-module" in
the body of a message to majordomo@vger.kernel.org
More majordomo info at http://vger.kernel.org/majordomo-info.html
[prev in list] [next in list] [prev in thread] [next in thread]
Configure |
About |
News |
Add a list |
Sponsored by KoreLogic