Skip site navigation (1)Skip section navigation (2)
Date:      Mon, 20 Sep 1999 16:33:04 -0700
From:      Steve <sreid@sea-to-sky.net>
To:        Robert Watson <robert+freebsd@cyrus.watson.org>
Cc:        Jobe <jobe@attrition.org>, ark@eltex.ru, freebsd@gndrsh.dnsmgr.net, security@FreeBSD.ORG
Subject:   Re: Real-time alarms
Message-ID:  <19990920163304.A334@grok.localnet>
In-Reply-To: <Pine.BSF.3.96.990920115728.42321E-100000@fledge.watson.org>; from Robert Watson on Mon, Sep 20, 1999 at 12:10:34PM -0400
References:  <Pine.LNX.3.96.990920085058.13128R-100000@forced.attrition.org> <Pine.BSF.3.96.990920115728.42321E-100000@fledge.watson.org>

next in thread | previous in thread | raw e-mail | index | archive | help

On Mon, Sep 20, 1999 at 12:10:34PM -0400, Robert Watson wrote:
> One thing I am particularly interested in seeing brought to fruition is a
> way to protect key system security processes from interference--from any
> other user process, even one running as root.  This might be similar to
> the jail code--the world being in a jail and only processes such as auditd
> (possibly init?) outside of it.  Processes would be unable to attach
> debuggers to protected processes while securelevel was set above a certain
> value, and limited in their ability to signal the processes, etc.

Init used to be able to lower the securelevel and for that reason had
(and still has?) some kernel code protecting it. IIRC, it was decided
that Init's ability to lower the securelevel be revoked after it was
discovered that the protections did not take cover procfs.

The protections may still be in the kernel and might be adapted to
protect other processes.

Also, although you can signal Init, if it dies for any reason the
system will reboot. This might be useful for security-related
monitoring processes as well.

Sorry, I don't have code... Not a kernel hacker.


To Unsubscribe: send mail to majordomo@FreeBSD.org
with "unsubscribe freebsd-security" in the body of the message




Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?19990920163304.A334>