[11404] in cryptography@c2.net mail archive
RE: Challenge to TCPA/Palladium detractors
daemon@ATHENA.MIT.EDU (Lucky Green)
Fri Aug 9 10:21:22 2002
From: "Lucky Green" <shamrock@cypherpunks.to>
To: <crawdad@fnal.gov>, <cypherpunks@lne.com>,
<cryptography@wasabisystems.com>
Date: Fri, 9 Aug 2002 00:48:21 -0700
In-Reply-To: <8c708993eecdbee279fbe47fdeb4a0d0@aarg.net>
Anonymous wrote:
> Matt Crawford replied:
> > Unless the application author can predict the exact output of the
> > compilers, he can't issue a signature on the object code. The
> > compilers then have to be inside the trusted base, checking a
> > signature on the source code and reflecting it somehow through a
> > signature they create for the object code.
>
> It's likely that only a limited number of compiler
> configurations would be in common use, and signatures on the
> executables produced by each of those could be provided.
> Then all the app writer has to do is to tell people, get
> compiler version so-and-so and compile with that, and your
> object will match the hash my app looks for. DEI
The above view may be overly optimistic. IIRC, nobody outside PGP was
ever able to compile a PGP binary from source that matched the hash of
the binaries built by PGP.
--Lucky Green
---------------------------------------------------------------------
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to majordomo@wasabisystems.com