Date: Thu, 25 Feb 2016 07:03:05 +0100 From: Terje Elde <terje@elde.net> To: Robert Ayrapetyan <robert.ayrapetyan@gmail.com> Cc: freebsd-security@freebsd.org Subject: Re: verify FreeBSD installation Message-ID: <A6D06224-5502-4CAC-A88D-951E25466D51@elde.net> In-Reply-To: <56CD2EE3.5080009@gmail.com>
index | next in thread | previous in thread | raw e-mail
> On 24 Feb 2016, at 05:17, Robert Ayrapetyan <robert.ayrapetyan@gmail.com> wrote: > > Hi. Is there any reliable way to verify checksums of all local files for some FreeBSD installation? E.g. I'm using a hoster which provides pre-deployed FreeBSD instances, how can I be sure there are no any patches\changes in a kernel\services etc? Does FreeBSD provides any automated tools for such kind of a verification? Just a quick note; if you suspect malicious intent from a competent attacker (your provider in this case), running an IDS-type check won't do. It's possible to use a kernel-module that omits itself when you're looking at the file system after boot for example, so it'd be invisible or look normal when checking the filesystem. Since you say "instance", I'm thinking probably VPS, in which case there needs to be a level of trust in the provider anyway, and this probably doesn't apply to you. Just wanted to mention it quickly as an apropos. Terjehome | help
Want to link to this message? Use this
URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?A6D06224-5502-4CAC-A88D-951E25466D51>
