Subject: Re: what's in a name? fingerprinted exec
To: Simon J. Gerraty <sjg@crufty.net>
From: Brett Lymn <blymn@baesystems.com.au>
List: tech-security
Date: 10/16/2002 22:04:03
On Tue, Oct 15, 2002 at 11:19:11PM -0700, Simon J. Gerraty wrote:
>
> Also, you can have the benefit of "signed" binaries with no more cost
> than the hashing - in as much as you can have a userland tool that
> verifies the signature (eg. binary is signed by a trusted 3rd party
> such as the OS vendor or the local admin) and only if valid, passes the
> hash down to the kernel so that the binary can be exec'd.
>
Someone else was thinking about pursuing this, it does provide some
other capabilities but has it's own downsides - you cannot apply the
scheme to a shell script.
> Even if you go so far as to do the signature verification in the kernel,
> the result of that can again be simply installing the hash in the
> "ok to exec" list or whatever.
>
Ummmm that is exactly what I am proposing to add to the kernel!
--
Brett Lymn