Date: Thu, 25 Feb 2016 07:03:05 +0100 From: Terje Elde <terje@elde.net> To: Robert Ayrapetyan <robert.ayrapetyan@gmail.com> Cc: freebsd-security@freebsd.org Subject: Re: verify FreeBSD installation Message-ID: <A6D06224-5502-4CAC-A88D-951E25466D51@elde.net> In-Reply-To: <56CD2EE3.5080009@gmail.com> References: <56CD2EE3.5080009@gmail.com>
next in thread | previous in thread | raw e-mail | index | archive | help
> On 24 Feb 2016, at 05:17, Robert Ayrapetyan <robert.ayrapetyan@gmail.com> w= rote: >=20 > Hi. Is there any reliable way to verify checksums of all local files for s= ome FreeBSD installation? E.g. I'm using a hoster which provides pre-deploye= d FreeBSD instances, how can I be sure there are no any patches\changes in a= kernel\services etc? Does FreeBSD provides any automated tools for such kin= d of a verification? Just a quick note; if you suspect malicious intent from a competent attacker= (your provider in this case), running an IDS-type check won't do. It's poss= ible to use a kernel-module that omits itself when you're looking at the fil= e system after boot for example, so it'd be invisible or look normal when ch= ecking the filesystem.=20 Since you say "instance", I'm thinking probably VPS, in which case there nee= ds to be a level of trust in the provider anyway, and this probably doesn't a= pply to you. Just wanted to mention it quickly as an apropos.=20 Terje
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?A6D06224-5502-4CAC-A88D-951E25466D51>