kernel lock down series
play

Kernel lock-down series - PowerPoint PPT Presentation

Kernel lock-down series http://outflux.net/slides/2014/lss/lockdown.pdf Linux Security Summit, Chicago 2014 Kees Cook <keescook@chromium.org> (pronounced Case) Overview What and why Objections/Rebuttals Name


  1. Kernel lock-down series http://outflux.net/slides/2014/lss/lockdown.pdf Linux Security Summit, Chicago 2014 Kees Cook <keescook@chromium.org> (pronounced “Case”)

  2. Overview ● What and why ● Objections/Rebuttals ● Name ● Discuss! Kernel lock-down 2/6 Linux Security Summit 2014 Aug 18, 2014

  3. What, why? ● Verified boot flow wants to keep kernel trusted and userspace untrusted: bright line between kernel memory and userspace memory lkml thread: https://lkml.org/lkml/2014/2/26/554 git: https://git.kernel.org/cgit/linux/kernel/git/kees/linux.git/commit/?h=lockdown Kernel lock-down 3/6 Linux Security Summit 2014 Aug 18, 2014

  4. Objections/Rebuttals ● Should be new capabilities flag – Totally orthogonal to capabilites, breaks userspace, not all protections are process-based ● It's not perfect, so it shouldn't happen at all – How else can we evolve the protection over time? ● CAP_SYS_RAWIO should be revoked too – Needed for things that don't violate ring0/uid0 ● Not useful/wouldn't be used – Fedora has been carrying it for a while – One-off Identical limitations have been added to hibernation and kexec Kernel lock-down 4/6 Linux Security Summit 2014 Aug 18, 2014

  5. Name ● “securelevel” – Linus said “No” ● “trusted_kernel” – Boot firmware trusts the kernel (via whatever mechanism, including measurement) ● “measured_kernel” – Not all cases are measured ● “lockdown_kernel” – It's the request being made by whatever wants to enforce the kernel/userspace separation Kernel lock-down 5/6 Linux Security Summit 2014 Aug 18, 2014

  6. Talk amongst yourselves I'll give you a topic ... http://outflux.net/slides/2014/lss/firmware.pdf keescook@chromium.org Kernel lock-down Linux Security Summit 2014 Aug 18, 2014

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend