[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

Re: checking system integrity

On Fri, Feb 09, 2001 at 07:15:06PM +1100, Brian May wrote:
> >>>>> "Matt" == Matt Zimmerman <mdz@debian.org> writes:
>     Matt> If the system has been compromised, you can't even trust
>     Matt> executables on secure media, as you can't be sure that
>     Matt> you're actually executing what you think you're executing.
> Good point.
> So it seems the only secure method is to create a bootable CD-ROM with
> tripwire and {public,private} key files installed, and boot from the
> CD-ROM to conduct the check if you are paranoid enough to want to do
> this. Otherwise, normal checks just use the files from the read-only
> media.


> Somebody else had an interesting point of integrating this somehow
> into the package management system. I think this is interesting as
> packages could come supplied with their own policy information and/or
> database entries. Ideally this should be done so:
Yes also.

You may want to read this flamefest on debian-security:


And the proposal I wrote up afterwards:


I'm still intending to do this, but haven't looked at if for a few weeks
now (organising my PhD thesis will be a major distraction at least until
the end of March).  I have some incomplete Python code, but need to sit
down and work out how it's going to interact with the signature stuff
which John Goerzen and Ben Collins have been working on.

If this is ever going to turn into a polished end-user product, it'll
probably require a few people working on it, because the desirable
menu-based user interface for the bootable CD could be a little 

Peter Eckersley                         http://www.cs.mu.oz.au/~pde 
(pde@cs.mu.oz.au)              TLI:  http://www.computerbank.org.au
<~~~~.sig temporarily conservative pending divine intervention~~~~>
GPG fingerprint: 30BF 6A78 2013 DCFA 5985  E255 9D31 4A9A 7574 65BC

Attachment: pgp_yFamAryMS.pgp
Description: PGP signature

Reply to: