I completely forgot I uploaded VistaPro 3.20 (the scenery renderer) to the Internet Archive, where you can run it from your browser. For those sudden urges of wanting to create some landscapes.
https://archive.org/details/vistapro320
Includes the MakePath tool.
Don't forget to take screenshots of your creations! Nothing can be retrieved from the disk the in-browser DOSBox keeps, as far as I know.
(Please be patient with the Archive's speed, they're dealing with persistent DDoS attacks at the moment)
While developing asymmetric TPM2 keys, and reviewing TPM bus encryption earlier, I came to realize that both tpm2-tools and ibmtss feel unintuitive.
So I started to seek, if some had ever backed up my old tpm2-scripts, from which kselftest was inherited. I did not have anymore any repo for that one.
With Google I luckily found a backup from the Github profile of @colinianking, so thank you for that. Then I just copied over latest version of just tpm2.py
(GPL/BSD dual-licensed file).
Probably will have some incompatibility issues with old scripts and updated main module (less than 10 updates in its total life-time tho) but I will fix them as soon as I need to test anything.
Anyway, a new and to-be-lean TPM2 hacking tool has been initiated: tpm2ctl (there’s no even file of that name yet but definitely will be at some point ;-)).
A plea for more thoughtful comments https://lwn.net/Articles/975597/ #tech #linux
Ever wondered why @torvalds coined the #Linux #kernel's "no regressions" rule? He just explained it again here: https://lore.kernel.org/all/CAHk-=wgtb7y-bEh7tPDvDWru7ZKQ8-KMjZ53Tsk37zsPPdwXbA@mail.gmail.com/
'"[…] I introduced that "no regressions" rule something like two decades ago, because people need to be able to update their kernel without fear of something they relied on suddenly stopping to work. […]"'
Follow the link for context and other statements that did not fit into a toot.
Emailed to TCG:
Forwarded message from Trusted Computing Group on Wed May 29, 2024 at 1:58 PM:
Message Body:
Some views on topic I've written:
- https://social.kernel.org/notice/AiNuw35YY9uOSrhiK0
- https://github.com/wolfSSL/wolfTPM/issues/356
Linux kernel patch set ongoing which made me realize that p256k1 is lacking from your registry:
- https://lore.kernel.org/linux-integrity/20240528210823.28798-1-jarkko@kernel.org/
This really should exist despite not being the most secure ECC given the compatibility to a number o
f open source projects and platforms (not just ETH and BTC). Please read also the above links, the w
rite ups are short and to the point. This would add by factors the importance of TPM2 ecosystem spre
ading to new applications.
--
This e-mail was sent from a contact form on Trusted Computing Group (https://trustedcomputinggroup.o
rg)
On possibility of adding TPM_ECC_SECP_P256_K1 curve to https://trustedcomputinggroup.org/wp-content/uploads/TCG-Algorithm-Registry-Revision-1.34_pub-1.pdf
This is the first version with fully working #ECDSA signing and signature verification with the public key.
Implementation notes:
match_table_t param_keys
in security/keys/keyctl_pkey.c
. E.g. "policy=%s"
.I’m pretty happy with this, given that I did it fully during 1.5 week period on my free time and unpaid ;-)
Linux 6.10-rc1 got released yesterday. With brand new `mseal()` system call.
So my automation kicked in, posted pull request, I merged, page with system calls table got rebuilt:
https://gpages.juszkiewicz.com.pl/syscalls-table/syscalls.html
For this worktree is useful:
git worktree add ~/work/linux-tpmdd-master master
When you have find a bug while working on feature branch and want to quickly do a fix without too much context switch…
Then later:
git worktree remove linux-tpmdd-master
CONFIG_ASN1_RUST
opt-in early drafting: https://github.com/alex/rust-asn1/issues/462