Posts
5026
Following
329
Followers
500
Linux kernel hacker and maintainer etc.

OpenPGP: 3AB05486C7752FE1
@lkundrak @vbabka one of my all time fav norweigan band is turbonegro :-)
0
0
2

Jarkko Sakkinen

what the fuck is youtube offering to me
1
0
0
ray of light was produced by william orbit, and that shows. i.e. in terms of composition and production it is a great album.
1
0
2

Jarkko Sakkinen

Edited 20 days ago
one aspect in security, which has been wrong even in some of the linux foundations pages from time to time is that they differentiate answers between "incorrect password" and "acount does not exist". this should be obviously opaque.

it allows to query which sites user has an account, which is useful information in wrong hands already.

#infosec #oracle
0
2
1

Jarkko Sakkinen

when it comes to infosec i'm glad at least that the "era of silly security questions" is over.

it was super-frustating to copy-paste set-and-forget one-time pad answers to questions such as "what was your mothers maiden name", when they were still a thing.

i don't know who invented them but the person should get some kind of worst invention of IT ever award or something.

#infosec #password
1
0
2

Jarkko Sakkinen

Next thing I'll add to tpm2sh is direct support for keyctl syscall and key re-creation in kernel. After that I can revisit asymmetric keys kernel patch set :-)
0
0
0
@Foxboron I recently migrated from shim to sbctl based secure boot. Now I'm thinking why I did not do this before :-)
1
0
0

Jarkko Sakkinen

Edited 20 days ago
for what is worth here's arch installation running for my Ryzen 9950X desktop :-)

https://git.kernel.org/pub/scm/linux/kernel/git/jarkko/sysdarch.git/

Just though to upload it somewhere for backup.

It has secure boot (sbctl), TPM2 unlock, and finally EXT4, which is probably a twist from current standards (but is so convenient given universal support everywhere).
2
0
0

Jarkko Sakkinen

rust learning of today: to avoid integer overflows when summing up lengths, always use checked_add in such situations :-)

E.g., this is wrong:

    let total_body_len =
        handle_area_size + parameter_area_size_field_len + param_area_size + sessions_len;

And this is right:

    let total_body_len = handle_area_size
        .checked_add(parameter_area_size_field_len)
        .and_then(|len| len.checked_add(param_area_size))
        .and_then(|len| len.checked_add(sessions_len))
        .ok_or(TpmProtocolError::IntegerTooLarge)?;

#rustlang

0
1
1
@tess Actually bullet two is the key of learning and understanding software and becoming a upstream contributor in most of major open source projects :-) You improve the system patch at a time until you understand why it works the way it does.

Thus, 180 degrees disagreement on bullet 2.
0
0
1

Heh, Amazon's satellite internet service launched yesterday and their first marketing angle is “how about you get your AWS Direct Connect over satellite instead of paying for cross connects”
https://www.aboutamazon.com/news/amazon-leo/amazon-leo-satellite-internet-ultra-pro

1
1
1

Here is my Ukraine peace proposal:

1. Putin is sent to The Hague.
2. Russian soldiers leave Ukraine including Crimea.
3. Russia returns all kidnapped Ukrainian children.
4. Russia releases all Ukrainian prisoners.
5. Russia pays damages for everything their war has destroyed.
6. Russia pays damages to Ukrainian families who have lost family members.
7. Russia pays damages to every person who has been tortured, abducted or otherwise criminally mistreated.
8. Ukraine becomes a member of the EU.

2
12
2

Jarkko Sakkinen

the main problem with confidential computing is and will be that it is not hacker enabled ecosystem.

or it's as hacker enabled as IBM mainframes.

i.e., there is no such thing as distruptive innovation.

it might be commercially viable story for companies that produce the hardware to other big companies but it is still a sad story ;-)

and you do not own the hardware EVEN if you buy it because it's locked in to the CPU companies CA.
0
0
1

Jarkko Sakkinen

This screenshot shows strong evidence of:

1. OpenSSL cross-compatibility.
2. tpm2-tools cross-compatibility.
3. Linux kernel compatibility (as in trusted keys and in future also asymmetric keys).

#linux #kernel #tpm #rustlang
0
0
3

Jarkko Sakkinen

in kernel testing i've moved from qemu to "libvirt + qemu" :-) why i haven't done this before...
1
0
0
Show older