Re: System call interposition/unprotecting the table

2007-08-18 Thread Andi Kleen
On Fri, Aug 17, 2007 at 10:19:00AM -0400, Dave Jones wrote: > On Wed, Aug 15, 2007 at 12:48:35AM +0200, Andi Kleen wrote: > > > > > In general the .data protection is only considered a debugging > > > > feature. I don't know why Fedora enables it in their production > > > > kernels. > > > >

Re: System call interposition/unprotecting the table

2007-08-17 Thread Dave Jones
On Wed, Aug 15, 2007 at 12:48:35AM +0200, Andi Kleen wrote: > > > In general the .data protection is only considered a debugging > > > feature. I don't know why Fedora enables it in their production > > > kernels. > > > > That would be because we think you are wrong 8) > > Well, it might

Re: System call interposition/unprotecting the table

2007-08-14 Thread Andi Kleen
> Then you fix the specific case and the game continues. If they intercept netdev->hard_start_xmit there is nothing to fix. Or inode->i_ops or any other virtual method pointer that is called often.. Putting i_ops into const memory doesn't help either -- they can just copy them and use their own a

Re: System call interposition/unprotecting the table

2007-08-14 Thread Alan Cox
> So even with Alan's hypervisor support the whole thing would be still > quite holey. The argument of raising the bar also doesn't seem very Its materially harder, especially with the hypervisor. > convincing to me, because attackers reuse code too and it's enough > when someone publishes such

Re: System call interposition/unprotecting the table

2007-08-14 Thread Jan Engelhardt
On Aug 14 2007 21:50, Andi Kleen wrote: >Hajime Inoue <[EMAIL PROTECTED]> writes: > >> Just protecting the table does not stop rootkits. A highly referenced >> phrack article explains how to bypass the table. > >During .23-pre for some time the kernel text was protected too (that >would have lik

Re: System call interposition/unprotecting the table

2007-08-14 Thread Andi Kleen
Hajime Inoue <[EMAIL PROTECTED]> writes: > Just protecting the table does not stop rootkits. A highly referenced > phrack article explains how to bypass the table. During .23-pre for some time the kernel text was protected too (that would have likely stopped that particular attack), but it was

Re: System call interposition/unprotecting the table

2007-08-14 Thread Arjan van de Ven
> Just protecting the table does not stop rootkits. not in general no; however it requires more rights than before (eg code execute rather than just "write to memory") > Why isn't the rest of the kernel code protected along with the table? it is if you set the right config options. - To unsu

Re: System call interposition/unprotecting the table

2007-08-14 Thread Alan Cox
> Just protecting the table does not stop rootkits. A highly referenced > phrack article explains how to bypass the table. But most people are not capable of fllowing that article - or they wouldn't be asking here whatever their intention. > Why isn't the rest of the kernel code protected alon

Re: System call interposition/unprotecting the table

2007-08-14 Thread Hajime Inoue
Thanks for your comments. Alan Cox wrote: > This is to protect it from being changed by an attacker or someone trying > to do strange and bogus things to the kernel. > > What are you actually trying to achieve ? I am trying to emulate an attacker. I'm helping develop a system that that detects

Re: System call interposition/unprotecting the table

2007-08-14 Thread James Morris
On Tue, 14 Aug 2007, Avi Kivity wrote: > Alan Cox wrote: > > This is to protect it from being changed by an attacker or someone trying > > to do strange and bogus things to the kernel. > > > > Someone who apparently hasn't heard of vmap(), etc. > > It's a debug aid at best. It clarifies to a

Re: System call interposition/unprotecting the table

2007-08-14 Thread Alan Cox
On Tue, 14 Aug 2007 08:12:29 +0300 Avi Kivity <[EMAIL PROTECTED]> wrote: > Alan Cox wrote: > > This is to protect it from being changed by an attacker or someone trying > > to do strange and bogus things to the kernel. > > > > Someone who apparently hasn't heard of vmap(), etc. > > It's a deb

Re: System call interposition/unprotecting the table

2007-08-13 Thread Avi Kivity
Alan Cox wrote: > This is to protect it from being changed by an attacker or someone trying > to do strange and bogus things to the kernel. > Someone who apparently hasn't heard of vmap(), etc. It's a debug aid at best. -- Do not meddle in the internals of kernels, for they are subtle and qu

Re: System call interposition/unprotecting the table

2007-08-13 Thread Alan Cox
On Mon, 13 Aug 2007 18:05:35 -0400 [EMAIL PROTECTED] wrote: > I have a question about changing the page attributes of the > system call table. Please don't do that. > This works fine on my debian system, but apparently the stock Fedora > kernel (2.6.22) has the system call table write protected.