Skip site navigation (1)Skip section navigation (2)
Date:      Tue, 15 Jun 2004 12:12:22 +0200
From:      des@des.no (=?iso-8859-1?q?Dag-Erling_Sm=F8rgrav?=)
To:        Radko Keves <rado@daemon.sk>
Cc:        security@FreeBSD.org
Subject:   Re: Unprivilegued settings for FreeBSD kernel variables
Message-ID:  <xzphdtd8709.fsf@dwp.des.no>
In-Reply-To: <20040615100102.GA12078@daemon.sk> (Radko Keves's message of "Tue, 15 Jun 2004 12:01:02 %2B0200")
References:  <20040615100102.GA12078@daemon.sk>

next in thread | previous in thread | raw e-mail | index | archive | help
Radko Keves <rado@daemon.sk> writes:
> EXAMPLE:
> kernel module can gives you a new sysctl (for example kern.securelevel2):
> kern.securelevel2
> with which you can lower/raiser sysctl.securelevel variable
> (source code attached)

     The kernel runs with five different levels of security.  Any super-user
     process can raise the security level, but no process can lower it.  The
     security levels are:

     -1    Permanently insecure mode - always run the system in level 0 mod=
e.
           This is the default initial value.

     0     Insecure mode - immutable and append-only flags may be turned of=
f.
           All devices may be read or written subject to their permissions.

     1     Secure mode - the system immutable and system append-only flags =
may
           not be turned off; disks for mounted file systems, /dev/mem,
           /dev/kmem and /dev/io (if your platform has it) may not be opened
           for writing; kernel modules (see kld(4)) may not be loaded or
           unloaded.

     [...]

so how, exactly, is the attacker going to load his malicious kernel
module?

DES
--=20
Dag-Erling Sm=F8rgrav - des@des.no



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?xzphdtd8709.fsf>