Skip site navigation (1)Skip section navigation (2)
Date:      Mon, 23 Jul 2001 10:01:40 -0400
From:      Jason Andresen <jandrese@mitre.org>
To:        Mike Hoskins <mike@adept.org>
Cc:        Tom <tom@uniserve.com>, "Chad R. Larson" <chad@dcfinc.com>, admin@kremilek.gyrec.cz, freebsd-stable@freebsd.org
Subject:   Re: probably remote exploit
Message-ID:  <3B5C2E44.2B7D7DF8@mitre.org>
References:  <Pine.BSF.4.21.0107201151110.17247-100000@snafu.adept.org>

index | next in thread | previous in thread | raw e-mail

Mike Hoskins wrote:
> 
> On Fri, 20 Jul 2001, Tom wrote:
> 
> >   But if a backdoor is installed, you can't trust cvsup, or make either.
> > Any binary could have been tampered with.  For instance, I would make a
> > backdoor make that would detect that an installworld is underway, and
> > always make sure that a backdoored copy of of "login" and another copy of
> > "make".
> 
> What?  Everyone can't just do a quick check against the saved tripwire
> checksums on CD-R?  ;)  Seriously.  While checksuming an entire system can
> be impractical, keeping checksums for a barebones set of administrative
> tools can be a lifesaver.

You need to boot off of the CDROM first, otherwise you might have an
evil
kernel module loaded that can send bogus data to your checksummer when
it
reads from the disk.  It's not quite as easy as just mounting the CD and
running the checksums. 

-- 
  \  |_ _|__ __|_ \ __| Jason Andresen        jandrese@mitre.org
 |\/ |  |    |    / _|  Network and Distributed Systems Engineer
_|  _|___|  _| _|_\___| Office: 703-883-7755


To Unsubscribe: send mail to majordomo@FreeBSD.org
with "unsubscribe freebsd-stable" in the body of the message



help

Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?3B5C2E44.2B7D7DF8>