TE
TechEcho
Home24h TopNewestBestAskShowJobs
GitHubTwitter
Home

TechEcho

A tech news platform built with Next.js, providing global tech news and discussions.

GitHubTwitter

Home

HomeNewestBestAskShowJobs

Resources

HackerNews APIOriginal HackerNewsNext.js

© 2025 TechEcho. All rights reserved.

Open Source Implementation of the Two-Man Rule in Go

53 pointsby dknechtover 11 years ago

2 comments

jlgaddisover 11 years ago
What stops root from modifying the source code to, for example, record user passwords?<p>It seems that, for this to really work, you&#x27;d need to run it on a machine running, i.e. SELinux and MCS. You&#x27;d have to restrict physical (console) access as well, so 1) no running it on a VM and 2) enforce the &quot;two-man rule&quot; for access to the server room as well.<p>That said, I guess it&#x27;s certainly a big step up from nothing.
评论 #6778364 未加载
评论 #6779437 未加载
nteonover 11 years ago
The strangeness I see is that the &#x2F;delegate call isn&#x27;t specific. I can&#x27;t say that I want Joe to be able to decrypt LaunchCode3, so I could end up inadvertently allowing Mary to decrypt SecretLocation without really wanting to - it is wide open to timing attacks. This doesn&#x27;t seem like a fundamental flaw, just something (maybe) overlooked in v1. Very cool stuff.