Is it possible to access linux/ramdisk code memory from its running system?
I'm working with an embedded Linux device that has to be auditioned by a regulatory agency.
The agency will select a few devices in the field to check if the code running is the same as auditioned.
In oder to do so, the user who is checking the device selects a few read-only memory areas (where our application is) of the flash memory and our application has to output its hash md5 sum.
If the hash matches the hash of the device that was auditioned, all good.
The problem is: How can I ensure integrity of the operating system code as well?
Is there any flag/mechanism I can compile my Linux with so I'll have access to ROM memory area of the zImage from which it was copied to RAM? And what about the ramdisk?
linux embedded flash-memory integrity source-code
add a comment |
I'm working with an embedded Linux device that has to be auditioned by a regulatory agency.
The agency will select a few devices in the field to check if the code running is the same as auditioned.
In oder to do so, the user who is checking the device selects a few read-only memory areas (where our application is) of the flash memory and our application has to output its hash md5 sum.
If the hash matches the hash of the device that was auditioned, all good.
The problem is: How can I ensure integrity of the operating system code as well?
Is there any flag/mechanism I can compile my Linux with so I'll have access to ROM memory area of the zImage from which it was copied to RAM? And what about the ramdisk?
linux embedded flash-memory integrity source-code
You can read the memory (possibly now it is a kernel configuration option, because of security abuse). But like programs, loader could change some addresses (depending on where exactly the kernel is placed).
– Giacomo Catenazzi
Feb 11 at 16:22
add a comment |
I'm working with an embedded Linux device that has to be auditioned by a regulatory agency.
The agency will select a few devices in the field to check if the code running is the same as auditioned.
In oder to do so, the user who is checking the device selects a few read-only memory areas (where our application is) of the flash memory and our application has to output its hash md5 sum.
If the hash matches the hash of the device that was auditioned, all good.
The problem is: How can I ensure integrity of the operating system code as well?
Is there any flag/mechanism I can compile my Linux with so I'll have access to ROM memory area of the zImage from which it was copied to RAM? And what about the ramdisk?
linux embedded flash-memory integrity source-code
I'm working with an embedded Linux device that has to be auditioned by a regulatory agency.
The agency will select a few devices in the field to check if the code running is the same as auditioned.
In oder to do so, the user who is checking the device selects a few read-only memory areas (where our application is) of the flash memory and our application has to output its hash md5 sum.
If the hash matches the hash of the device that was auditioned, all good.
The problem is: How can I ensure integrity of the operating system code as well?
Is there any flag/mechanism I can compile my Linux with so I'll have access to ROM memory area of the zImage from which it was copied to RAM? And what about the ramdisk?
linux embedded flash-memory integrity source-code
linux embedded flash-memory integrity source-code
edited Feb 12 at 0:54
Jardel Lucca
asked Feb 11 at 11:58
Jardel LuccaJardel Lucca
83
83
You can read the memory (possibly now it is a kernel configuration option, because of security abuse). But like programs, loader could change some addresses (depending on where exactly the kernel is placed).
– Giacomo Catenazzi
Feb 11 at 16:22
add a comment |
You can read the memory (possibly now it is a kernel configuration option, because of security abuse). But like programs, loader could change some addresses (depending on where exactly the kernel is placed).
– Giacomo Catenazzi
Feb 11 at 16:22
You can read the memory (possibly now it is a kernel configuration option, because of security abuse). But like programs, loader could change some addresses (depending on where exactly the kernel is placed).
– Giacomo Catenazzi
Feb 11 at 16:22
You can read the memory (possibly now it is a kernel configuration option, because of security abuse). But like programs, loader could change some addresses (depending on where exactly the kernel is placed).
– Giacomo Catenazzi
Feb 11 at 16:22
add a comment |
0
active
oldest
votes
Your Answer
StackExchange.ready(function() {
var channelOptions = {
tags: "".split(" "),
id: "106"
};
initTagRenderer("".split(" "), "".split(" "), channelOptions);
StackExchange.using("externalEditor", function() {
// Have to fire editor after snippets, if snippets enabled
if (StackExchange.settings.snippets.snippetsEnabled) {
StackExchange.using("snippets", function() {
createEditor();
});
}
else {
createEditor();
}
});
function createEditor() {
StackExchange.prepareEditor({
heartbeatType: 'answer',
autoActivateHeartbeat: false,
convertImagesToLinks: false,
noModals: true,
showLowRepImageUploadWarning: true,
reputationToPostImages: null,
bindNavPrevention: true,
postfix: "",
imageUploader: {
brandingHtml: "Powered by u003ca class="icon-imgur-white" href="https://imgur.com/"u003eu003c/au003e",
contentPolicyHtml: "User contributions licensed under u003ca href="https://creativecommons.org/licenses/by-sa/3.0/"u003ecc by-sa 3.0 with attribution requiredu003c/au003e u003ca href="https://stackoverflow.com/legal/content-policy"u003e(content policy)u003c/au003e",
allowUrls: true
},
onDemand: true,
discardSelector: ".discard-answer"
,immediatelyShowMarkdownHelp:true
});
}
});
Sign up or log in
StackExchange.ready(function () {
StackExchange.helpers.onClickDraftSave('#login-link');
});
Sign up using Google
Sign up using Facebook
Sign up using Email and Password
Post as a guest
Required, but never shown
StackExchange.ready(
function () {
StackExchange.openid.initPostLogin('.new-post-login', 'https%3a%2f%2funix.stackexchange.com%2fquestions%2f499923%2fis-it-possible-to-access-linux-ramdisk-code-memory-from-its-running-system%23new-answer', 'question_page');
}
);
Post as a guest
Required, but never shown
0
active
oldest
votes
0
active
oldest
votes
active
oldest
votes
active
oldest
votes
Thanks for contributing an answer to Unix & Linux Stack Exchange!
- Please be sure to answer the question. Provide details and share your research!
But avoid …
- Asking for help, clarification, or responding to other answers.
- Making statements based on opinion; back them up with references or personal experience.
To learn more, see our tips on writing great answers.
Sign up or log in
StackExchange.ready(function () {
StackExchange.helpers.onClickDraftSave('#login-link');
});
Sign up using Google
Sign up using Facebook
Sign up using Email and Password
Post as a guest
Required, but never shown
StackExchange.ready(
function () {
StackExchange.openid.initPostLogin('.new-post-login', 'https%3a%2f%2funix.stackexchange.com%2fquestions%2f499923%2fis-it-possible-to-access-linux-ramdisk-code-memory-from-its-running-system%23new-answer', 'question_page');
}
);
Post as a guest
Required, but never shown
Sign up or log in
StackExchange.ready(function () {
StackExchange.helpers.onClickDraftSave('#login-link');
});
Sign up using Google
Sign up using Facebook
Sign up using Email and Password
Post as a guest
Required, but never shown
Sign up or log in
StackExchange.ready(function () {
StackExchange.helpers.onClickDraftSave('#login-link');
});
Sign up using Google
Sign up using Facebook
Sign up using Email and Password
Post as a guest
Required, but never shown
Sign up or log in
StackExchange.ready(function () {
StackExchange.helpers.onClickDraftSave('#login-link');
});
Sign up using Google
Sign up using Facebook
Sign up using Email and Password
Sign up using Google
Sign up using Facebook
Sign up using Email and Password
Post as a guest
Required, but never shown
Required, but never shown
Required, but never shown
Required, but never shown
Required, but never shown
Required, but never shown
Required, but never shown
Required, but never shown
Required, but never shown
You can read the memory (possibly now it is a kernel configuration option, because of security abuse). But like programs, loader could change some addresses (depending on where exactly the kernel is placed).
– Giacomo Catenazzi
Feb 11 at 16:22