From: Vasili on
"what am I trying to accomplish?" I am sure others have thought about
this problem already. But I am trying to guarantee that the OS/system
loader is not preparing to execute malware.

Vasili

On Jul 5, 7:01 pm, "FromTheRafters" <erra...(a)nomail.afraid.org> wrote:
> "Vasili" <vigalc...(a)gmail.com> wrote in message
>
> news:710730bf-2f65-4c25-8dc0-b8ded60e340b(a)c33g2000yqm.googlegroups.com...
> On Jul 5, 4:01 pm, "FromTheRafters" <erratic @nomail.afraid.org>
> wrote:
>
>
>
> > "Vasili" <vigalc...(a)gmail.com> wrote in message
>
> >news:93daa5d9-b4fb-404e-801c-11a9d039280f(a)d8g2000yqf.googlegroups.com...
>
> > > Hello,
>
> > > Has anyone implemented a loader that will only execute digitally
> > > signed executables?
>
> > Not that I have heard of, but why would the control have to be there
> > as
> > opposed to earlier? Why not integrity check before sending to the
> > loader
> > chain, that way interpreted programs can be checked at the same time
> > as
> > binaries or files otherwise destined to become binary images?
>
> By "earlier" where are you suggesting to do integrity check?
>
> ***
> When the file is opened (if you want it that way).
>
> What are you trying to accomplish?
> ***

From: FromTheRafters on
"Vasili" <vigalchin(a)gmail.com> wrote in message
news:150b80cc-a24f-4b3a-9c33-467622bff106(a)t10g2000yqg.googlegroups.com...
Hi FromTheRafters,

I am only concerned about "data in motion" ....e.g. if the
executable has to moved over the wire to the loader then it's
integrity can be compromised after it's integrity check on the
"source" side of the wire where the loader is on the destination side
of the wire. See my point?

***
I found a paper on a proposal for such a thing for an ELF loader:

http://webcache.googleusercontent.com/search?q=cache:QMOJ1mQDIu8J:www.cs.umd.edu/~waa/pubs/cs4259.ps+linux+signed+execuatble&cd=2&hl=en&ct=clnk&gl=us

However, as with most such schemes there is a trade off in processing
cost. To avoid computing cost the signed executable check is only done
if the cryptographic hash (integrity check) indicates a 'change
detection'.

It just seems to me that implementing such a scheme for other executable
filetypes would mean each loader would have redundant code to implement
the check(s). Why not have one point that checks executables destined
for the loader chain?

As for the data being compromised 'in motion' I would think that a
normal 'integrity check' would suffice.
***

[...]

PS But then we have to be concerned about a hierarchy of signing
authority lest a malware writer signs his/her executable to masquerade
as "clean" executable. Yes?

***
I suppose that a signed executable's signature would be checked upon
arrival on the local machine, and integrity checks thereafter. The
signing check assures that the executable is authentic (original) but
makes no claim as to whether it is malware or not, and the integrity
check checks that it has very likely not changed again since it arrived.

Some antivirus applications already implement an integrity checking
scheme to avoid the computing cost of checking for 'infections' in *all*
executable filetypes.
***

On Jul 5, 7:01 pm, "FromTheRafters" <erra...(a)nomail.afraid.org> wrote:
> "Vasili" <vigalc...(a)gmail.com> wrote in message
>
> news:710730bf-2f65-4c25-8dc0-b8ded60e340b(a)c33g2000yqm.googlegroups.com...
> On Jul 5, 4:01 pm, "FromTheRafters" <erratic @nomail.afraid.org>
> wrote:
>
>
>
> > "Vasili" <vigalc...(a)gmail.com> wrote in message
>
> >news:93daa5d9-b4fb-404e-801c-11a9d039280f(a)d8g2000yqf.googlegroups.com...
>
> > > Hello,
>
> > > Has anyone implemented a loader that will only execute digitally
> > > signed executables?
>
> > Not that I have heard of, but why would the control have to be there
> > as
> > opposed to earlier? Why not integrity check before sending to the
> > loader
> > chain, that way interpreted programs can be checked at the same time
> > as
> > binaries or files otherwise destined to become binary images?
>
> By "earlier" where are you suggesting to do integrity check?
>
> ***
> When the file is opened (if you want it that way).
>
> What are you trying to accomplish?
> ***


From: FromTheRafters on
"Vasili" <vigalchin(a)gmail.com> wrote in message
news:4902dcc6-953f-4d47-a5b5-d182c4082b99(a)c10g2000yqi.googlegroups.com...
"what am I trying to accomplish?" I am sure others have thought about
this problem already. But I am trying to guarantee that the OS/system
loader is not preparing to execute malware.

***
I asked this because It wouldn't help against authentic malware. The
signing checks only for authenticity and makes no claims as to whether
or not you should execute the program. An integrity check would lessen
the likelihood that an executable that had been modified after receipt
to include malware (infection) would be executed. That is to say that an
executable having been infected prior to signing would not be thwarted,
but an executable having been modified 'after the fact' would likely be.

Not a bad idea, but it seems that regular integrity checking (change
detection) would still be the strength of the system.
***


First  |  Prev  | 
Pages: 1 2
Prev: Super Fast Web Proxies
Next: Weird spam