Re: [RFC v4][PATCH 2/2] intel_txt: Intel(R) TXT and tboot kernelsupport
From: Pavel Machek
Date: Mon Aug 24 2009 - 05:45:00 EST
On Mon 2009-06-29 08:46:07, James Morris wrote:
> On Fri, 26 Jun 2009, Pavel Machek wrote:
>
> >
> > > Also, hardware security measures such as TXT are important in providing
> > > stronger mechanisms to ensure that kernel security mechanisms are
> > > functioning correctly.
> >
> > I don't get it. How does TXT help kernel security mechanisms?
>
> Kernel security mechanisms can be subverted and bypassed in the case of an
> exploitable kernel vulnerability, or from exploitable buggy hardware (e.g.
> which can access the entire host's memory via DMA). Attacks on kernel
> security mechanisms have been describe in detail, see:
> http://www.phrack.com/issues.html?issue=66&id=15#article
>
> This is close to impossible to solve from within the kernel alone.
> Hardware support is required to allow protection of the IO space (e.g. via
> IOMMU/VT-d), and to allow verification of the kernel itself (via
> TXT).
So... you can exploit kernel security holes. How does intel TXT help?
AFAICT it does not. From what I see, intel TXT only prevents user
from physically tampering with his own machine. Preventing user from
tampering with his own machine is immoral to me, and from what I've
seen it will be ineffective as soon as user suspends the machine, uses
some liquid nitrogen, does whatever he needs with the RAM modules, and
then places them back.
Pavel
--
(english) http://www.livejournal.com/~pavelmachek
(cesky, pictures) http://atrey.karlin.mff.cuni.cz/~pavel/picture/horses/blog.html
--
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@xxxxxxxxxxxxxxx
More majordomo info at http://vger.kernel.org/majordomo-info.html
Please read the FAQ at http://www.tux.org/lkml/