Subject: Re: verified executable kernel modification committed
To: matthew green <mrg@eterna.com.au>
From: Andrew Brown <atatat@atatdot.net>
List: current-users
Date: 10/29/2002 10:04:42
> Q: So, how do you stop the list being updated later?
> A: by using securelevel - the fingerprints can only be loaded at
> securelevel == 0. The full effect of the verified exec is in
> effect at securelevel > 2 (i.e. 3 onwards), at this point warnings
> about invalid/missing fingerprints become fatal errors, before this
> they were merely warnings.
>
>i assume that is "securelevel <= 0" ?
prolly, but the "securelevel > 2" bit gives me pause. why not just
"securelevel > 1"?
> Q: Doesn't chflags(1) do all this already?
> A: Not really. It can be used to do some of the work but there are
> some things it cannot do like prevent a file from being executed
> nor can it give any confidence that what you are executing has not
> been tampered with.
>
>how does it not give you confidence it has not been tampered with?
because now tampering with the underlying filesytem is evident,
whereas chflags doesn't protect you against that?
--
|-----< "CODE WARRIOR" >-----|
codewarrior@daemon.org * "ah! i see you have the internet
twofsonet@graffiti.com (Andrew Brown) that goes *ping*!"
werdna@squooshy.com * "information is power -- share the wealth."