Skip site navigation (1)Skip section navigation (2)
Date:      Fri, 17 Apr 2015 13:30:58 +0930
From:      "O'Connor, Daniel" <darius@dons.net.au>
To:        Yuri <yuri@rawbw.com>
Cc:        freebsd-hackers@FreeBSD.org
Subject:   Re: Is it possible to check the running kernel signature?
Message-ID:  <7C5F6DC3-5507-409E-B58A-F9F291D1924A@dons.net.au>
In-Reply-To: <553074DE.4070106@rawbw.com>
References:  <553074DE.4070106@rawbw.com>

next in thread | previous in thread | raw e-mail | index | archive | help

> On 17 Apr 2015, at 12:20, Yuri <yuri@rawbw.com> wrote:
> The idea that comes to mind is the ability to verify that the running =
kernel wasn't tampered with by comparing it with its disk image copy. =
Same with the kernel modules. Kernel can be verified through the memory =
mmapped to /dev/mem device.

> Is this idea feasible, and would it make sense to implement it?

If the kernel has been compromised then you can't trust it, since any =
userland program has to use the kernel to do its job it is impossible to =
validate the kernel because the kernel could just fake up anything it =
wants.

Also I think when the kernel is loaded it is modified for things like =
relocations (although I'm not sure) which would make it tricky to =
verify.

--
Daniel O'Connor
"The nice thing about standards is that there
are so many of them to choose from."
 -- Andrew Tanenbaum
GPG Fingerprint - 5596 B766 97C0 0E94 4347 295E E593 DC20 7B3F CE8C




Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?7C5F6DC3-5507-409E-B58A-F9F291D1924A>