Skip to content
This repository has been archived by the owner on Nov 14, 2021. It is now read-only.

Module name can be easily tampered #23

Open
milabs opened this issue Jan 25, 2019 · 11 comments
Open

Module name can be easily tampered #23

milabs opened this issue Jan 25, 2019 · 11 comments

Comments

@milabs
Copy link

milabs commented Jan 25, 2019

const char *mod_wl[] = {

@nbulischeck
Copy link
Owner

Can you provide more clarification on this?

@milabs
Copy link
Author

milabs commented Jan 25, 2019

After malicious module loaded it could change its name which is actually stored in struct module structure.

@nbulischeck
Copy link
Owner

What are your suggestions? This was done in a previous issue as a user was reporting false positives.

@milabs
Copy link
Author

milabs commented Jan 25, 2019

Having this whitelist based on just names not a good idea at all as any module can mimic to whitelisted one. No suggestions just some thoughts about this.

@nbulischeck
Copy link
Owner

Thanks! I'll look into alternative solutions for the time being.

@ghost
Copy link

ghost commented Jul 4, 2019

Let's discuss. How cat we detect modules, which legaly used netfilter hooks at the moment of "insmod tyton"? I mean automatically. If we try to read this list from kernel, we can't detect, which are illegal only by their names. I want to take part in solving this.

@ghost
Copy link

ghost commented Jul 4, 2019

perhaps, read a list of modules for netfilter and iptables? Is it enough?

@nbulischeck
Copy link
Owner

@dronito As mentioned above, names themselves won't do as a module may or may not be present and a malicious module could imitate a valid name

@ghost
Copy link

ghost commented Jul 4, 2019

Sorry, i was inattentive

@ghost
Copy link

ghost commented Jul 22, 2019

Nick, hi! Please, could we discuss with you some topic about network subsystem in Linux kernel? If you have time, please, tell, where i can write you?

@v14dz
Copy link
Contributor

v14dz commented Jun 4, 2020

Hi! Instead, the whitelist could be a list of legitimate hook function addresses (symbols "arptable_filter_hook", "iptable_filter_hook", "ip6table_filter_hook", etc.). Then any hook that is pointing somewhere else would be considered malicious.

Sign up for free to subscribe to this conversation on GitHub. Already have an account? Sign in.
Labels
None yet
Projects
None yet
Development

No branches or pull requests

3 participants