On Fri, Jul 05, 2002 at 03:52:52AM -0700, Seth David Schoen wrote:
memory protection and monitor or control an arbitrary process. In Palladium, if a system is started in a trusted mode, not even the OS kernel will have access to all system resources.
That *might* be a contradiction in terms. If I understand this correctly, the TCPA or Palladium hardware will include some kind of memory management device, very similar to the ones we have in hardware of the last years, but which stores some kind of de-/encryption information for each page segment and which de-/encrypts every memory access. Doesn't seem to be much of a problem, except for speed. But how does this device know which segments belong to the software and which don't? Or how does it know whether an allowed or foreign task is accessing the protected areas (which is the same question again, = is the PC in a program segment which also belongs to the protected area). If this is done the simple way, like a normal OS configures the memory management when loading some executable software, the OS might at any time give wrong information to the device. In this case, the security depends on the integrity and bug-freeness of the OS, because the OS _could_ do it, but it is not supposed to do it. A more advanced way would be to have the program loaded by the operating system as before, but to have the Palladium device check some kind of signature to verify the correctness of the OS loading operation. This might lead to an uncontrollable problems, if programs start to load DLLs. Is the TCPA/Palladium trust transitive? If library A is trusted, and so is B, is then (A+B) trusted? A third way would be to keep the OS completely out of the job of loading software/programs into memory, and to have it done by the Palladium device. This isn't actually a third way, but a redefinition of terms and a migration. The OS isn't the OS anymore, because basic tasks of the OS have been migrated to the Palladium device, which is now to be considered as a piece of OS in silicon. I didn't find the time yet to read the TCPA description in detail. But from my current point of view I doubt that this will really work, provide the claimed security, and will still be a useful computer at the same time. I especially doubt that the same company, which completely fails to make Outlook or Internet Explorer resistent against content attacks (viruses, worms, ...) will be able to provide software which such a strict separation between trusted and untrusted data, as it is required for such a project to work. regards Hadmut