| ▲ | mapontosevenths a day ago | ||||||||||||||||
> make everything executable immutable How though? Presumably you mean we should trust the OS to do that? Edit to be clear auditd has the same issue. We're trusting it to audit itself. However, we know that we cant trust it because rootkits are a thing. So now what?... I guess we need a tool thats designed to be tamper proof to monitor it. We do that by introducing an external validation. A 2nd external system can vouch that hashes are what we expect, etc. | |||||||||||||||||
| ▲ | 1718627440 a day ago | parent | next [-] | ||||||||||||||||
So you have an OS of which you have the source, which is binary reproducible and you can compile yourself if you want to. You want to make that more trustworthy by injecting a random blob, you can not inspect and which updates itself over the network controlled by a third party. I do not understand your threat model. If you think your OS doesn't give you the correct answer to a read, than you need to run a second OS side-by-side and compare. If you think your OS is touching data you haven't told it to, you need to have a layer running below so you can check, i.e. virtualization, BIOS or hardware. If you think your OS is making network calls you haven't told it to, then you need to connect it via an intermediate host, that acts as a firewall. I don't see what injecting a random blob into the OS gives you other than box ticking. Now you need to trust the OS and that other thing. When your attacker gains control of your OS (so actually below root), than you are screwed anyways. Only having some layer independently will help you in that case. Having more code in your OS, won't help you at all, it will just add more attack surface. | |||||||||||||||||
| |||||||||||||||||
| ▲ | 1718627440 a day ago | parent | prev [-] | ||||||||||||||||
>> make everything executable immutable > How though? Presumably you mean we should trust the OS to do that? If you don't trust the layer controlling the hardware (aka. the OS) then you need to do that in hardware. | |||||||||||||||||