Re: encrypted root: prevent / detect tampering with kernel / initrd

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



Dne 28.12.2009 21:28, Olivier Sessink napsal(a):
> Hi all,
> 
> I was wondering if there are some 'common' ways to prevent tampering
> with the unencrypted kernel and initrd in the case of an encrypted root
> filesystem? If somebody has access to your computer they could change
> the initrd and kernel and make your encryption useless (e.g. store the
> password in /boot, or send it over the network, etc. etc.). It shouldn't
> be too hard to make this at least very difficult.
> 
> I was thinking along the lines of:
> - check a checksum of the MBR and partition table
> - check a checksum of the complete /boot filesystem
> - check the pointers in the kernel system call table (detects many
> rootkits)
> - check for virtualization (any virtual rootkits)
> - ...? any better ideas how to detect tampering?
> 
> Obviously all of this should be done by a binary inside the encrypted
> filesystem - everything in /boot (kernel and initrd) is not to be
> trusted. That means we can only warn the user after the password is
> probably gone already, but this is better than nothing.
> 
> Any comments, ideas or links  ?
> 
> regards,
> Olivier

Hi Olivier,

If you think someone had access to your hardware then you should avoid
running untrusted/modified kernel, initrd and bootloader at all.

The checksum approach looks fine to me when it's done with binaries from
trusted LiveCD/USB environment - http://www.sysresccd.org/

For /boot and bootloader might be efficient:
$ dd ... | sha512sum

If you're really paranoid then you should remove the drive and
investigate on another machine....... annoying.

HTH, Z.

_______________________________________________
dm-crypt mailing list
dm-crypt@xxxxxxxx
http://www.saout.de/mailman/listinfo/dm-crypt

[Index of Archives]     [Device Mapper Devel]     [Fedora Desktop]     [ATA RAID]     [Fedora Marketing]     [Fedora Packaging]     [Fedora SELinux]     [Yosemite News]     [KDE Users]     [Fedora Tools]     [Fedora Docs]

  Powered by Linux