Omen Wild wrote: >Building everything into the kernel has the distinct advantage?for our >system because part of the boot process will be to ensure the kernel >hasn't been tampered with. > Only if your boot prom does the verifying. A kernel that verifies itself can be replaced by root with a kernel that *says* it has verified itself. Look up Bill Arbaugh's dissertation and associated IEEE Symposium on Security & Privacy papers for gobs of detail. Crispin -- Crispin Cowan, Ph.D. http://immunix.com/~crispin/ Chief Scientist, Immunix http://immunix.com http://www.immunix.com/shop/ _______________________________________________ linux-security-module mailing list linux-security-moduleat_private http://mail.wirex.com/mailman/listinfo/linux-security-module
This archive was generated by hypermail 2b30 : Tue Jul 22 2003 - 01:29:26 PDT