Re: [RFC v4][PATCH 2/2] intel_txt: Intel(R) TXT and tboot kernelsupport

From: James Morris
Date: Sun Jun 28 2009 - 18:47:24 EST


On Fri, 26 Jun 2009, Pavel Machek wrote:

>
> > Also, hardware security measures such as TXT are important in providing
> > stronger mechanisms to ensure that kernel security mechanisms are
> > functioning correctly.
>
> I don't get it. How does TXT help kernel security mechanisms?

Kernel security mechanisms can be subverted and bypassed in the case of an
exploitable kernel vulnerability, or from exploitable buggy hardware (e.g.
which can access the entire host's memory via DMA). Attacks on kernel
security mechanisms have been describe in detail, see:
http://www.phrack.com/issues.html?issue=66&id=15#article

This is close to impossible to solve from within the kernel alone.
Hardware support is required to allow protection of the IO space (e.g. via
IOMMU/VT-d), and to allow verification of the kernel itself (via TXT).

A significant advance in this area is LKIM:
"Linux kernel integrity measurement using contextual inspection"
http://portal.acm.org/citation.cfm?id=1314354.1314362

(Unfortunately, the ACM has not made this freely available, although I
understand that individual authors are allowed to distribute their own
papers as they see fit).


- James
--
James Morris
<jmorris@xxxxxxxxx>
--
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@xxxxxxxxxxxxxxx
More majordomo info at http://vger.kernel.org/majordomo-info.html
Please read the FAQ at http://www.tux.org/lkml/