Re: LUKS/dm-crypt vulnerable?

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



Heinz Diehl schrieb:

..which is not true, of course. I can e.g. have a copy of the boot
sector/MBR on a memory stick, together with a checksum file of /boot.
Copying the first 512 bytes and checking it against the checksum of the
known good bootsector on the memory stick will detect any manipulation immediately.
A simple "dd if=mbr_copy of=/dev/sda bs=512 count=1" will cure the problem.

If the integrity of the system is compromised this won't help.

What if the trojan itself did "an dd if=/dev/sda of=hidden_mbr_copy..." and redirected all future read-access to the original MBR to this backup file?

The same would be true for manipulated kernels. They could keep the original kernel image in a hidden file and redirect all system calls aimed on the manipulated image to this good image. Alternatively they could simply manipulate md5sum, sh1sum or whatever and add logic like:
if filename==name of corrupted kernel
  print md5 of good kernel
else
  print true md5

Only booting from a trustworthy medium would help and the same is true in the case of truecrypt.


Marc
_______________________________________________
dm-crypt mailing list
dm-crypt@xxxxxxxx
http://www.saout.de/mailman/listinfo/dm-crypt

[Index of Archives]     [Device Mapper Devel]     [Fedora Desktop]     [ATA RAID]     [Fedora Marketing]     [Fedora Packaging]     [Fedora SELinux]     [Yosemite News]     [KDE Users]     [Fedora Tools]     [Fedora Docs]

  Powered by Linux