Date: Fri, 24 Mar 2000 12:36:12 +0000 From: Brian Somers <brian@Awfulhak.org> To: Kris Kennaway <kris@freebsd.org> Cc: Olaf Hoyer <ohoyer@fbwi.fh-wilhelmshaven.de>, security@freebsd.org, brian@hak.lan.Awfulhak.org Subject: Re: New article Message-ID: <200003241236.MAA02043@hak.lan.Awfulhak.org> In-Reply-To: Message from Kris Kennaway <kris@freebsd.org> of "Thu, 23 Mar 2000 17:41:05 PST." <Pine.BSF.4.21.0003231738450.51855-100000@freefall.freebsd.org>
next in thread | previous in thread | raw e-mail | index | archive | help
> On Fri, 24 Mar 2000, Olaf Hoyer wrote: > > > Question: Is a loadable kernel module not a potential security risk? > > Only if your machine is insecurely configured. > > > Imagine some attacker exchanging some kernel module against own code, and > > causing that module to be loaded (say, some driver for access to certain > > filesystems, or zip drive etc...), or waiting for the module to be loaded > > (say, for regular, scheduled activities like backups or batch jobs or so) > > This is why one of the first steps in securing that box should be to give > the modules the noschg flag. Hmm, probably this should be done by > default, like we noschg the kernel at install-time. The same should be done to the directory itself. Ditto for /bin, /usr/bin, /sbin, /usr/sbin etc - in fact, anything that's in roots path. And what about /etc/{*passwd,*pwd.db} ? Methinks this is a large can of worms ! > Kris > > ---- > In God we Trust -- all others must submit an X.509 certificate. > -- Charles Forsythe <forsythe@alum.mit.edu> -- Brian <brian@Awfulhak.org> <brian@[uk.]FreeBSD.org> <http://www.Awfulhak.org> <brian@[uk.]OpenBSD.org> Don't _EVER_ lose your sense of humour ! To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-security" in the body of the message
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?200003241236.MAA02043>