Protecting System Binaries From Trojan Attack 44
junyoung writes "Brett Lymn has added verified exec to NetBSD-current, which verifies a cryptographic hash before allowing execution of binaries and scripts. This can be used to prevent a system from running binaries or scripts which have been illegally modified or installed. Verified exec can also be used to limit the use of script interpreters to authorized scripts only and disallow interactive use."
Re:Will this really help? (Score:5, Informative)
What you propose is not feasible, if a hash like SHA or even MD5 is used.
Re:Will this really help? (Score:1, Informative)
Re:Will this really help? (Score:2, Insightful)
Re:Will this really help? (Score:2, Informative)
If they use a CRC [repairfaq.org], it could be difficult to get something to the same checksum. Even if it's only a 32 bit CRC, there are a lot of numbers between 0 and 2^32 - especially when they are the result of some unknown hash function.
That's not to say it couldn't be done - the idea is akin to the 'The Club'(TM).....
Re:Will this really help? (Score:2, Insightful)
Or perhaps better stated: show me the code.
Re:Will this really help? (Score:1)
BSD Innovation (Score:2, Interesting)
Re:BSD license is -good- (Score:1)
...and that's possibly the problem. If I write something and release it for the world to use, I want them to give their changes back to the world also. I want it to stay free.
IT is free. (Score:2, Insightful)
Code others make out of it may not be.
So you want to dictate that only those people who are going to give code away are allowed to modify your code. That's fine, just don't pretend it's about freedom.
User friendly Palladium ? (Score:5, Interesting)
This looks like a good step in that direction. Yes, it's no the same, but that's exactly the point.
Re:User friendly Palladium ? (Score:4, Informative)
Although, when/if this is presented as an alternative it will be interesting to see their response as to why it's not sufficient.
Steve
Re:User friendly Palladium ? (Score:1)
What about bash? (Score:1)
Re:What about bash? (Score:1)
Seems backwards (Score:5, Interesting)
I gave this some thought a while back, and more from the perspective of the user-space loader, and decided that it made much more sense to compile a public key into the kernel and cryptographically sign all trusted binaries.
The result is similar - you still have to verify the checksum before you load the file, but instead of having a hardcoded list of hashes that could be a maintenance nightmare you just check the checksum attached to the file itself.
It would also be easy for the kernel to determine that an executable was signed. Or you could be a bit more intelligent and stuff the signatures within the ELF file as an extension - this would allow you to protect the executable code, yet allow the initialized data (which could contain messages, etc.) to be modified.
The kernel would then only need to have a few public keys (or certs) - the project itself, an integrator, perhaps a local developer or two. Private keys, needless to say, should never be stored on the system.
All that remains is monitoring the list of authorized keys. That would be easy to do; I don't remember if BSD has a
Of course, since this is all blindingly obvious (it has to be, if I came up with it on my own with a few minutes thought) I'm sure that the USPTO has given a patent for it to somebody. Probably Microsoft.
Re:Seems backwards (Score:2)
My sentiments exactly :) Promote the system from using a hash to using a MAC, and gain flexibility and simplicity.
There is also the possibility of increased security: if an attacker finds a way to modify the hash list in the kernel, they could put in a trojan binary, or add a new verified binary. With a asymmetric key MAC system, then can't change the key without invalidation ALL of the verified binaries, which means also changing the MACs stored in/with this binaries. That's quite a bit of effort.
But this is a great step forward.
Re:Seems backwards (Score:2)
Quick addition: this also allows you to introduce new verified binaries into the system without rebooting ...
Re:Seems backwards (Score:1)
Say you want to update your server. You put those binaries on a floppy or whatever, take them to the signing computer and sign them. Then you copy those binaries to the server with the signature.
Since you can't fake a signature the kernel can verify that the binary has been signed by you. If you used the checksums idea you'd have to keep a checksum per file, which probably would require a recompilation and a reboot every time you wanted to update something.
Re:Seems backwards (Score:1)
Re:Seems backwards (Score:1)
It sounds like hashes were used because, while they're a performance hit, they're not -that- big of a performance hit. Evaluating a signature (say, RSA or DSA) is more CPU-intensive than MD5 or SHA1. We're talking an order of magnitude here, maybe more. This would have to be done on each load of an executable, shared library, and shell script. Also, a lot of OSen are still resistant to putting potentially restricted crypto into kernel-level systems.
As far as placing the signatures into the ELF binaries, the author discusses that in the e-mail and rejects it for two reasons:
1. Doesn't work for #! shell scripts. A separate fingerprint table does.
2. Putting the signature in the file still allows the file to be replaced, signature and all. Loading the signatures into a kernel table on boot makes it harder to munge them at runtime. It's not just untrusted executables we don't want to allow -- replacing one trusted app with another (say, ls with rm?) can be just as bad.
Beyond that, though, I agree -- signed (rather than simply fingerprinted) files could definitely be a good thing, and I'll be watching to see how all this develops.
Re:Seems backwards (Score:1)
No, it wouldn't. The kernel should cache the hashes of binaries that have already been verified. So you get the performance hit only once (given a sufficiently large cache, RAM is cheap) per reboot or replaced binary.
I guess... (Score:4, Insightful)
"Even if the file did have the same inode if the contents are modified then the fingerprint will not match anyway."
Huh?? So, the attacker just regens the hash on the trojaned binary and the kernel thinks it is the cached value...am I missing something here? Can one NOT change the cached hash without creating a seperate inode or something?
Re:I guess... (Score:2)
Re:I guess... (Score:1)
Yes, you are missing something. You cannot "just regen the hash", the list is in kernel and cannot be updated once the securelevel has been raised. The attacker would have to regen the hash, insert it into the list of hashes to be loaded at boot and then reboot the machine. A slightly more difficult task.
Can one NOT change the cached hash without creating a seperate inode or something?
The hash is not cached, the comparison result is. If the file is somehow updated then the cached comparison result gets cleared.
Rather pointless (Score:1, Funny)
different ways to colorize file listings. Everybody
knows that only by having the most ways to colorize file
listings will you actually have a better operating system.
Nobody cares about how good your tcp stack is or
if you have a more secure operating system. Its all
about colorizing file listings.
more details on verified exec (Score:4, Informative)