NetBSD/sbin/veriexecctl
elad 8fc0d7a9c3 Introduce per-page fingerprints in Veriexec.
This closes a hole pointed out by Thor Lancelot Simon on tech-kern ~3
years ago.

The problem was with running binaries from remote storage, where our
kernel (and Veriexec) has no control over any changes to files.

An attacker could, after the fingerprint has been verified and
program loaded to memory, inject malicious code into the backing
store on the remote storage, followed by a forced flush, causing
a page-in of the malicious data from backing store, bypassing
integrity checks.

Initial implementation by Brett Lymn.
2005-10-05 13:48:48 +00:00
..
Makefile Move WARNS=3 to the Makefile.inc, and add a little const to the remaining 2005-06-27 01:00:04 +00:00
veriexecctl_conf.l Some refactoring and bugfixes: 2005-06-13 15:18:44 +00:00
veriexecctl_parse.y Introduce per-page fingerprints in Veriexec. 2005-10-05 13:48:48 +00:00
veriexecctl.8 Introduce per-page fingerprints in Veriexec. 2005-10-05 13:48:48 +00:00
veriexecctl.c Introduce per-page fingerprints in Veriexec. 2005-10-05 13:48:48 +00:00
veriexecctl.h Remove leftovers from Vexec. 2005-05-20 20:06:34 +00:00