Re: Integrity checking NANOBSD images

看板FB_security作者時間19年前 (2006/07/12 04:06), 編輯推噓0(000)
留言0則, 0人參與, 最新討論串3/15 (看更多)
In message <44B4010E.7010809@mac.com>, Chuck Swiger writes: >Checksumming the device image is a fine way of checking the integrity of it, >assuming it is read-only. The only thing you might want to do is use two or >three checksum algorithms (ie, use sha256 and md5 and something else), so that >someone can't create a new image which matches the sha256 checksum of the >original. A much better idea is to send a random "salt" to be prepended to the disk image before it is run through sha256, that would prevent the attacker from running sha256 and any other algorithm you could care for on the image, store the results and return them with trojans. Copying the sha256 binary over is no guarantee against a kernel embedded trojan. But then again, how paranoid one has to be is a matter of preference. -- Poul-Henning Kamp | UNIX since Zilog Zeus 3.20 phk@FreeBSD.ORG | TCP/IP since RFC 956 FreeBSD committer | BSD since 4.3-tahoe Never attribute to malice what can adequately be explained by incompetence. _______________________________________________ freebsd-security@freebsd.org mailing list http://lists.freebsd.org/mailman/listinfo/freebsd-security To unsubscribe, send any mail to "freebsd-security-unsubscribe@freebsd.org"
文章代碼(AID): #14j0JN00 (FB_security)
討論串 (同標題文章)
文章代碼(AID): #14j0JN00 (FB_security)