Re: Security-What can be done in kernel to disable forever executable memory modificaton

2019-01-17 Thread Elazar Leibovich
Another thing you should note, that if you do not protect boot integrity, you're grinding water, because all your hypervisor based protection and magnificent hardening would be null and void after the next reboot. Generally speaking, I really recommend you to get paid consultancy from a

Re: Security-What can be done in kernel to disable forever executable memory modificaton

2019-01-17 Thread Elazar Leibovich
What you probably want, is something similar to Windows VBS HVCI, which is usually achieved via underlying hypervisor. It forces you to pass the security boundary of the hypervisor, even if security boundary between user/kernel is bypassed. Have a look at Bromium or QubeOS for a full

Re: Security-What can be done in kernel to disable forever executable memory modificaton

2019-01-13 Thread Shachar Shemesh
On 12/01/2019 15:19, Lev Olshvang wrote: Hi All, The fact that the text segment could be modified is bad news from the security standpoint. For example, in order to set a breakpoint GDB should map a text segment with MAP_PRIVATE flag which allows kernel to

Security-What can be done in kernel to disable forever executable memory modificaton

2019-01-12 Thread Lev Olshvang
Hi All, The fact that the text segment could be modified is bad news from the security standpoint. For example, in order to set a breakpoint GDB should map a text segment with MAP_PRIVATE flag which allows kernel to ignore the dirty bit that MMU sets on this page. Somewhere in the middle