On 13 Feb 2002 03:35 PM, Anthony DeRobertis wrote:

> > But if the machine is restarted, those changes either do not
> > persist (same kernel) or are quite obvious (modified kernel
> > overwrites the old one, etc).  On the other hand, having a
> > hostile module inserted into the kernel not only allows
> > persistence, it is much harder to detect with IDS tools.
>
> Huh? How is there any different. Assuming you reboot off clean
> media to check for security issues (of course you do), loading a
> module automatically will show as a change in some file on the
> file system.

Hmm, this is true.  At this point, I was going on the advise I've been
given and what I've read in documentation and such, so my rationale may
indeed be flawed.  I have not, knock on wood, had a box compromised in
any way, so I have no practical experience in that regard.  Whether
that's the result of my security efforts, or just pure luck, who knows.

> > Linux has an abundance of malicious LKMs, ready for anyone
> > to download and implement, so I see this as a primary method
> > to potentially exploit my system.  YMMV.
>
> There are the same for systems without modules, unfortunately.
> I've seen it published on the web. No URL; sorry. Maybe Google
> can find it.

Yeah, I've heard tidbits on them, but I don't know anything substantial
about it.  I should probably make that "further reading".

> > I'm not saying this is the answer to every possible scenario.
> > There are a number of other items to tick off the "security
> > checklist", such as read-only media.  When added up, they make
> > it a lot harder for the casual skript kiddie to come along and
> > wreak havoc -- and hopefully  less-than-determined blackhats --
> > but I don't for a minute think I'm impenetrable.
>
> Here, we agree completely.

And I never meant to debate whether any given method could be
overridden, although it seems to have turned it into that.  I should
know better.... the stock answer to the original BIND problem would be
"chroot jail", which itself can supposedly be broken out of.  I was just
trying to give the original inquirer some ideas to implement, out of a
vast potential.  I'm no authority on Linux, much less this topic, so I
tried to qualify many of those points in my original message.  Sorry if
there was any confusion, I'm always up for (constructive) criticism when
I'm wrong.

Jeff Bonner


Reply via email to