Trusted Computing


 
Thread Tools Search this Thread
Special Forums Cybersecurity Trusted Computing
# 1  
Old 06-15-2006
Trusted Computing

About a year ago, a friend of mine who worked on the OReilly Snort book took a propsal he and I had worked on for a book on Trusted Computing. Though the editor thought the content was good and worthwhile, he felt that there wasn't enough of a market to justify printing such a work.

How many people here have systems that use one form or another of the Trusted Computing Base?

Cheers,

Keith
Login or Register to Ask a Question

Previous Thread | Next Thread

8 More Discussions You Might Find Interesting

1. UNIX for Beginners Questions & Answers

Adding an application in trusted computing base

How to add new application/ code into trusted computing base in linux? or How to bind new command for IMA-measurement at boot time in Ubuntu? (0 Replies)
Discussion started by: iambharatmanral
0 Replies

2. UNIX for Advanced & Expert Users

Converting system to trusted

Hi, I need to convert few HP-UX (V 11.31) machines from un-trusted to trusted. I used the HP SMH to do this on one server. However when I click on "Yes" to proceed with the conversion, I get this error : The attempt to convert this system to a trusted system failed. The command return value... (2 Replies)
Discussion started by: anaigini45
2 Replies

3. Linux

Linux kernel & Trusted Computing

Anyone have a current/cumulative list of all Trusted Computing-based drivers, modules, etc., that have been added to the kernel? (0 Replies)
Discussion started by: Varsel
0 Replies

4. Solaris

Solaris Trusted Extension ?

How to check if a system has Solaris trusted extensions installed or not on a solaris 10 system ? (5 Replies)
Discussion started by: fugitive
5 Replies

5. AIX

Switch off TCB (Trusted Computing Base)

I wanted to do an "Alternate Disk Migration" via my NIM server to update several clients (all LPARs in a p670) from 5.1 ML6 to 5.2 ML3. As a prerequisite the procedure says "if the system has the Trusted Computing Base enabled it has to be switched off before". Well, i didn't give this too much... (3 Replies)
Discussion started by: bakunin
3 Replies

6. Virtualization and Cloud Computing

Event Cloud Computing - IBM Turning Data Centers Into ?Computing Cloud?

Tim Bass Thu, 15 Nov 2007 23:55:07 +0000 *I predict we may experience less*debates*on the use of the term “event cloud”*related to*CEP in the future, now that both IBM and Google* have made announcements about “cloud computing” and “computing cloud”, IBM Turning Data Centers Into ‘Computing... (0 Replies)
Discussion started by: Linux Bot
0 Replies

7. HP-UX

Trusted system: Please Help.

I was playing with sam and i turned on the Trusted System feature (UX11i). Now i cant log onto it anymore, i can ping it, but icant telnet, rlogin or login at the login screen. I dont want to reboot my machine because i am affraid it wont boot and ask for a password. My root password is not... (1 Reply)
Discussion started by: Netghost
1 Replies

8. UNIX for Dummies Questions & Answers

NIS+ and trusted hosts

Hello there, Can someone tell me if you need to make the hosts trusted hosts if you use NIS+? Thanks, E (2 Replies)
Discussion started by: eknaap
2 Replies
Login or Register to Ask a Question
tnchkdb(1M)						  System Administration Commands					       tnchkdb(1M)

NAME
tnchkdb - check file syntax of trusted network databases SYNOPSIS
/usr/sbin/tnchkdb [-h path] [-t path] [-z path] DESCRIPTION
tnchkdb checks the syntax of the tnrhtp, tnrhdb, and tnzonecfg databases. By default, the path for each file is: o /etc/security/tsol/tnrhtp o /etc/security/tsol/tnrhdb o /etc/security/tsol/tnzonecfg You can specify an alternate path for any or all of the files by specifying that path on the command line by using the -h (tnrhdb), -t (tnrhtp) and -z (tnzonecfg) options. The options are useful when testing a set of modified files before installing the files as new system databases. All three database files are checked for integrity. tnchkdb returns an exit status of 0 if all of the files are syntactically and, to the extent possible, semantically correct. If one or more files have errors, then an exit status of 1 is returned. If there are command line problems, such as an unreadable file, an exit status of 2 is returned. Errors are written to standard error. To avoid cascading errors, when there are errors in tnrhtp, the template names in tnrhdb are not validated. tnchkdb can be run at any label, but the standard /etc/security/tsol files are visible only in the global zone. OPTIONS
-h [ path ] Check path for proper tnrhdb syntax. If path is not specified, then check /etc/security/tsol/tnrhdb. -t [ path ] Check path for proper tnrhtp syntax. If path is not specified, then check /etc/security/tsol/tnrhtp. -z [ path ] Check path for proper tnzonecfg syntax. If path is not specified, then check /etc/security/tsol/tnzonecfg. EXAMPLES
Example 1 Sample Error Message The tnchkdb command checks for CIPSO errors. In this example, the admin_low template has an incorrect value of ADMIN_HIGH for its default label. # tnchkdb checking /etc/security/tsol/tnrhtp ... tnchkdb: def_label classification 7fff is invalid for cipso labels: line 14 entry admin_low tnchkdb: def_label compartments 241-256 must be zero for cipso labels: line 14 entry admin_low checking /etc/security/tsol/tnrhdb ... checking /etc/security/tsol/tnzonecfg ... FILES
/etc/security/tsol/tnrhdb Trusted network remote-host database /etc/security/tsol/tnrhtp Trusted network remote-host templates /etc/security/tsol/tnzonecfg Trusted zone configuration database ATTRIBUTES
See attributes(5) for descriptions of the following attributes: +-----------------------------+-----------------------------+ | ATTRIBUTE TYPE | ATTRIBUTE VALUE | +-----------------------------+-----------------------------+ |Availability |SUNWtsu | +-----------------------------+-----------------------------+ |Interface Stability |See below. | +-----------------------------+-----------------------------+ The command line is Committed. The output is Uncommitted. SEE ALSO
tnd(1M), tnctl(1M), attributes(5) How to Check the Syntax of Trusted Network Databases in Solaris Trusted Extensions Administrator's Procedures NOTES
The functionality described on this manual page is available only if the system is configured with Trusted Extensions. It is possible to have inconsistent but valid configurations of tnrhtp and tnrhdb when LDAP is used to supply missing templates. SunOS 5.11 20 Jul 2007 tnchkdb(1M)