On 09/ 9/10 02:17 PM, [email protected] wrote:
On Thu, Sep 09, 2010 at 02:12:05PM -0700, Shawn Walker wrote:
On 09/ 9/10 02:02 PM, [email protected] wrote:
...
IMO, the case for verifying compromised systems duplicates functionality
already implemented in bart(1) and tripwire, but I'm willing to listen
to reasonable arguments to the contrary.

The problem with relying on bart(1) and tripwire is that pkg(5)
drives system updates using elfhash as opposed to the standard file
digest mechanism that other utilities use.

That makes it difficult to use tools other than pkg(1) to verify the system.

Understood, but in order for this to work correctly, we'd have to save
an entire snapshot of the pkg metadata after every image modifying
operation.  At that point, you may as well just re-generate the bart(1)
or tripwire databases based upon the state of the image after the
update.

We've talked about adding functionality in the past to recover from a corrupted or destroyed /var/pkg directory. Such functionality would analyse the system and based on the source repositories the user provided, would rebuild the set of installed packages based upon matching fingerprints.

However, that's still an educated guess at best since if the system has been compromised, it's unlikely that the installed files will match the digests from the various package manifests.

-Shawn
_______________________________________________
pkg-discuss mailing list
[email protected]
http://mail.opensolaris.org/mailman/listinfo/pkg-discuss

Reply via email to