1 |
On Tue, 2005-04-05 at 09:17 +0000, Genco YILMAZ wrote: |
2 |
> Hi, |
3 |
> I have been trying to learn pros and cons of SELinux and Grsecurity for |
4 |
> a period of time. Gentoo docs leave decision to us |
5 |
> so that we can use two and decide which one to use. I have read a Case |
6 |
> Study comparing Kernel Enhancements of these two methods from Virginia |
7 |
> University. |
8 |
> In one part, documents says that SELinux reimplemented as a |
9 |
> security model using LSM and Grsecurity doesnt use LSM. |
10 |
> After that, study tells the thougths of Spengler, which say LSM is |
11 |
> compiled and enabled in kernel, its symbols are exported. Thus, every |
12 |
> rootkit and backdoor writer will have every hook he ever wanted in the |
13 |
> kernel. This will allow for a new generation of sophisticated backdoors and |
14 |
> rootkits that will be nearly impossible to detect. |
15 |
> I have also read this statement in grsecurity.net. |
16 |
> A question comes into my mind after reading these docs as a user not |
17 |
> having much knowledge of internals of the kernel, |
18 |
> this isn't a threat for the future?, if yes, what is going to be the |
19 |
> future of SELinux? |
20 |
> I am sorry, If I am out of the subject a little bit, but I really |
21 |
> would like to learn thoughts of others about this subject... |
22 |
|
23 |
The only problem with that line of reasoning is that anyone with the |
24 |
necessary access to load a kernel module using LSM symbols is perfectly |
25 |
capable of using one of the existing non-lsm-aware rootkits to acheive |
26 |
the same thing. The only thing it does is make writing the things |
27 |
slightly easier, but those inclined towards writing rootkits have |
28 |
already proved that they're more than capable of doing it the |
29 |
old-fashioned way on a non-lsm kernel. Plus they're more likely not to |
30 |
use LSM hooks on the basis that the percentage of systems out there with |
31 |
it enabled is still fairly small. |
32 |
|
33 |
-- |
34 |
gentoo-hardened@g.o mailing list |