Skip site navigation (1)Skip section navigation (2)
Date:      Wed, 10 Oct 2001 11:43:27 +0200 (CEST)
From:      Alexander Leidinger <Alexander@Leidinger.net>
To:        cjclark@alum.mit.edu
Cc:        Alexander Langer <alex@big.endian.de>, deepak@ai.net, freebsd-security@FreeBSD.ORG
Subject:   Re: Kernel-loadable Root Kits
Message-ID:  <200110100943.f9A9hSK00843@Magelan.Leidinger.net>
In-Reply-To: <20011004023034.U8391@blossom.cjclark.org>

next in thread | previous in thread | raw e-mail | index | archive | help

> I went in and made a very simple kernel-build option which disables
> the use of kldload(2) (and kldunload(2)) at all times. This is not as
> good as raising securelevel(8) since root can still write to
> /dev/mem. However, a lot of people in this thread still seem to want
> this ability. Since you can still write to /dev/mem, it is only raises
> the bar a bit for an attacker. But it does raise the bar enough to
> possibly foil a skr1pt k1ddi3 or two.

If my memory serves me right there was an effort on -audit in the last
months to remove the need for /dev/mem. If this work is finished, the
NO_KLD patch would be more useful. If you commit this, you didn't only
raise the bar a bit for an attacker, it also would harden the system
when /dev/mem isn't needed anymore (maybe before 5.0-RELEASE, maybe
not).

Bye,
Alexander.

-- 
      ...and that is how we know the Earth to be banana-shaped.

http://www.Leidinger.net                       Alexander @ Leidinger.net
  GPG fingerprint = C518 BC70 E67F 143F BE91  3365 79E2 9C60 B006 3FE7


To Unsubscribe: send mail to majordomo@FreeBSD.org
with "unsubscribe freebsd-security" in the body of the message




Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?200110100943.f9A9hSK00843>