Skip site navigation (1)Skip section navigation (2)
Date:      Thu, 25 Feb 2016 07:03:05 +0100
From:      Terje Elde <terje@elde.net>
To:        Robert Ayrapetyan <robert.ayrapetyan@gmail.com>
Cc:        freebsd-security@freebsd.org
Subject:   Re: verify FreeBSD installation
Message-ID:  <A6D06224-5502-4CAC-A88D-951E25466D51@elde.net>
In-Reply-To: <56CD2EE3.5080009@gmail.com>
References:  <56CD2EE3.5080009@gmail.com>

next in thread | previous in thread | raw e-mail | index | archive | help


> On 24 Feb 2016, at 05:17, Robert Ayrapetyan <robert.ayrapetyan@gmail.com> w=
rote:
>=20
> Hi. Is there any reliable way to verify checksums of all local files for s=
ome FreeBSD installation? E.g. I'm using a hoster which provides pre-deploye=
d FreeBSD instances, how can I be sure there are no any patches\changes in a=
 kernel\services etc? Does FreeBSD provides any automated tools for such kin=
d of a verification?

Just a quick note; if you suspect malicious intent from a competent attacker=
 (your provider in this case), running an IDS-type check won't do. It's poss=
ible to use a kernel-module that omits itself when you're looking at the fil=
e system after boot for example, so it'd be invisible or look normal when ch=
ecking the filesystem.=20

Since you say "instance", I'm thinking probably VPS, in which case there nee=
ds to be a level of trust in the provider anyway, and this probably doesn't a=
pply to you. Just wanted to mention it quickly as an apropos.=20

Terje




Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?A6D06224-5502-4CAC-A88D-951E25466D51>