[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

Re: [Fwd: Re: LWN: Ptrace vulnerability in 2.2 and 2.4 kernels]



On Wed, Apr 02, 2003 at 09:46:52AM +0200, Dariush Pietrzak wrote:
> > of proportion... Some things in security _have_ to be obscure. Your
> > password, for example. Or the primes used to generate your PGP private
>  There's a difference between 'obscure' and 'secret'.

This is true.

> All you gain by removing kernel-loading capability from your kernel is to
> force cracker to search memory to find entry points.
>  That's like hiding key to your door under your doormat.

Thats not true. Or rather if it is, then using the key is
considerably harder than simply opening the door (which would be
equivalent of having module support using your metaphor).

But disabling module support isn't obscuring anything, its genuinely
changing the system. The attacker is in fact going to have to do
something different and more difficult to modify the kernel. 
You seem to be saying that if there is one way of achieving a
security breach, then you shouldn't bother stopping other ways of
achieving the same result. This is clearly ridiculas.

Yours, 

Tim

-- 
Tim Nicholas                          ||                      Cilix
Email: tim@nicholas.net.nz            ||    Wellington, New Zealand
http://tim.nicholas.net.nz/           ||   Cell/SMS: +64 21 337 204
"Sir, I think you have a problem with your brain being missing."



Reply to: