Wes Hardaker wrote:
>>>>>> On Thu, 21 Aug 2008 18:32:29 -0700, Bill Broadley <[EMAIL PROTECTED]> 
>>>>>> said:
> 
> BB> Does your distro/kernel allow writing to memory?
> 
> I meant protected even via root access...  But SElinux should provide
> this (I'm not an SELinux expert, mind you).

I meant via root.  Does it work on your system by default?

> BB> Not sure how you could prevent future loading of modules, or require
> BB> loading only from RO media.
> 
> You'd have to only allow loading from the RO media.  Anytime you wanted
> something new, you'd need to boot from something new.  It'd be a pain
> when you needed to change, of course.

I'm not against it in principal, I just don't see how it would be practical to 
implement.  The signed modules has an implementation, and doesn't require the 
reboots.  But does require a module to be signed private key.  So you can 
leave 100s of unused modules around and load them willy nilly, but still can't 
run a trojan module... all without having any exposure since the private key 
does not need to be on the system.
_______________________________________________
vox-tech mailing list
vox-tech@lists.lugod.org
http://lists.lugod.org/mailman/listinfo/vox-tech

Reply via email to