Gentoo Archives: gentoo-security

From: "Johnson
To: gentoo-security@l.g.o, gentoo-security@l.g.o
Subject: RE: [gentoo-security] Running untrusted software
Date: Wed, 18 Jan 2006 15:34:58
A good host based IDS  (file integrity monitoring system) would record any system level changes made. IT should be fairly trivial to start of with a sterile environment prior to running your CSA and inspecting the environment afterwards.

Try Tripwire or AID.

-----Original Message-----
From:	Douglas Breault Jr. on behalf of Douglas Breault Jr
Sent:	Wed 1/18/2006 8:58 AM
To:	gentoo-security@l.g.o
Subject:	[gentoo-security] Running untrusted software
Hash: RIPEMD160


I am being forced to run software on my computer that I do not
inherently trust. It is supposed to collect a few pieces of information,
mainly my mac addresses and use the network. It is a one-time use CSA
(client security agent). It uses a csh script to unpack a "proprietary
binary" that we cannot see the source. There is no assurance it doesn't
collect other information or change anything on my computer.

I was curious as to what is the best way to handle this and situations
like these. In this instance, I was assuming downloading, and running on
a LiveCD would seem like the best policy. What if it uses methods to
discover that and I need to run it on my real installation? Is a chroot
jail the next best thing? As far as I know, to make a chroot jail I
merely copy programs and libraries inside a folder with the proper /
hierarchy and chroot into it. Is it more complex than this and are there
any guides?

Any and all suggestions are welcome.

Thank you,
Douglas Breault Jr.

- --
How do I know the past isn't fiction designed to account for the discrepancy
between my immediate physical sensations and my state of mind?

/~\ The ASCII        Douglas Breault Jr. <GenKreton at comcast dot net>
\ / Ribbon Campaign  GnuPG public key ID: C4E44A19 (
 X  Against HTML     Key fingerprint:
/ \ Email!           21C3 F37D A8F5 1955 05F2  9A69 92A0 C177 C4E4 4A19
Version: GnuPG v1.4.2 (GNU/Linux)

gentoo-security@g.o mailing list


Subject Author
Re: [gentoo-security] Running untrusted software Oliver Schad <o.schad@×××.de>