Date: Tue, 15 Jun 2004 12:12:22 +0200 From: des@des.no (=?iso-8859-1?q?Dag-Erling_Sm=F8rgrav?=) To: Radko Keves <rado@daemon.sk> Cc: security@FreeBSD.org Subject: Re: Unprivilegued settings for FreeBSD kernel variables Message-ID: <xzphdtd8709.fsf@dwp.des.no> In-Reply-To: <20040615100102.GA12078@daemon.sk> (Radko Keves's message of "Tue, 15 Jun 2004 12:01:02 %2B0200") References: <20040615100102.GA12078@daemon.sk>
next in thread | previous in thread | raw e-mail | index | archive | help
Radko Keves <rado@daemon.sk> writes: > EXAMPLE: > kernel module can gives you a new sysctl (for example kern.securelevel2): > kern.securelevel2 > with which you can lower/raiser sysctl.securelevel variable > (source code attached) The kernel runs with five different levels of security. Any super-user process can raise the security level, but no process can lower it. The security levels are: -1 Permanently insecure mode - always run the system in level 0 mod= e. This is the default initial value. 0 Insecure mode - immutable and append-only flags may be turned of= f. All devices may be read or written subject to their permissions. 1 Secure mode - the system immutable and system append-only flags = may not be turned off; disks for mounted file systems, /dev/mem, /dev/kmem and /dev/io (if your platform has it) may not be opened for writing; kernel modules (see kld(4)) may not be loaded or unloaded. [...] so how, exactly, is the attacker going to load his malicious kernel module? DES --=20 Dag-Erling Sm=F8rgrav - des@des.no
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?xzphdtd8709.fsf>